Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2014-9130 (GCVE-0-2014-9130)
Vulnerability from cvelistv5
Published
2014-12-08 16:00
Modified
2024-08-06 13:33
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
scanner.c in LibYAML 0.1.5 and 0.1.6, as used in the YAML-LibYAML (aka YAML-XS) module for Perl, allows context-dependent attackers to cause a denial of service (assertion failure and crash) via vectors involving line-wrapping.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T13:33:13.456Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "62705", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62705" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bitbucket.org/xi/libyaml/commits/2b9156756423e967cfd09a61d125d883fca6f4f2" }, { "name": "71349", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/71349" }, { "name": "DSA-3102", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2014/dsa-3102" }, { "name": "62174", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62174" }, { "name": "RHSA-2015:0112", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-0112.html" }, { "name": "[oss-security] 20141128 libyaml / YAML-LibYAML DoS", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2014/11/28/1" }, { "name": "MDVSA-2015:060", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:060" }, { "name": "USN-2461-3", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2461-3" }, { "name": "DSA-3115", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2014/dsa-3115" }, { "name": "openSUSE-SU-2015:0319", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00078.html" }, { "name": "[oss-security] 20141129 Re: Re: libyaml / YAML-LibYAML DoS", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2014/11/29/3" }, { "name": "62774", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62774" }, { "name": "[oss-security] 20141128 Re: libyaml / YAML-LibYAML DoS", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2014/11/28/8" }, { "name": "RHSA-2015:0260", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-0260.html" }, { "name": "62723", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62723" }, { "name": "USN-2461-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2461-1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://puppet.com/security/cve/cve-2014-9130" }, { "name": "USN-2461-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2461-2" }, { "name": "62176", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62176" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bitbucket.org/xi/libyaml/issue/10/wrapped-strings-cause-assert-failure" }, { "name": "MDVSA-2014:242", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:242" }, { "name": "DSA-3103", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2014/dsa-3103" }, { "name": "60944", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/60944" }, { "name": "openSUSE-SU-2016:1067", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-04/msg00050.html" }, { "name": "62164", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62164" }, { "name": "libyaml-cve20149130-dos(99047)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99047" }, { "name": "RHSA-2015:0100", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-0100.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://linux.oracle.com/errata/ELSA-2015-0100.html" }, { "name": "59947", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59947" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://advisories.mageia.org/MGASA-2014-0508.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-11-25T00:00:00", "descriptions": [ { "lang": "en", "value": "scanner.c in LibYAML 0.1.5 and 0.1.6, as used in the YAML-LibYAML (aka YAML-XS) module for Perl, allows context-dependent attackers to cause a denial of service (assertion failure and crash) via vectors involving line-wrapping." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-12-08T10:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "62705", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62705" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bitbucket.org/xi/libyaml/commits/2b9156756423e967cfd09a61d125d883fca6f4f2" }, { "name": "71349", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/71349" }, { "name": "DSA-3102", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2014/dsa-3102" }, { "name": "62174", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62174" }, { "name": "RHSA-2015:0112", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-0112.html" }, { "name": "[oss-security] 20141128 libyaml / YAML-LibYAML DoS", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2014/11/28/1" }, { "name": "MDVSA-2015:060", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:060" }, { "name": "USN-2461-3", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2461-3" }, { "name": "DSA-3115", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2014/dsa-3115" }, { "name": "openSUSE-SU-2015:0319", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00078.html" }, { "name": "[oss-security] 20141129 Re: Re: libyaml / YAML-LibYAML DoS", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2014/11/29/3" }, { "name": "62774", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62774" }, { "name": "[oss-security] 20141128 Re: libyaml / YAML-LibYAML DoS", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2014/11/28/8" }, { "name": "RHSA-2015:0260", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-0260.html" }, { "name": "62723", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62723" }, { "name": "USN-2461-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2461-1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://puppet.com/security/cve/cve-2014-9130" }, { "name": "USN-2461-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2461-2" }, { "name": "62176", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62176" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bitbucket.org/xi/libyaml/issue/10/wrapped-strings-cause-assert-failure" }, { "name": "MDVSA-2014:242", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:242" }, { "name": "DSA-3103", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2014/dsa-3103" }, { "name": "60944", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/60944" }, { "name": "openSUSE-SU-2016:1067", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-04/msg00050.html" }, { "name": "62164", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62164" }, { "name": "libyaml-cve20149130-dos(99047)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99047" }, { "name": "RHSA-2015:0100", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-0100.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://linux.oracle.com/errata/ELSA-2015-0100.html" }, { "name": "59947", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59947" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://advisories.mageia.org/MGASA-2014-0508.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-9130", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "scanner.c in LibYAML 0.1.5 and 0.1.6, as used in the YAML-LibYAML (aka YAML-XS) module for Perl, allows context-dependent attackers to cause a denial of service (assertion failure and crash) via vectors involving line-wrapping." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "62705", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62705" }, { "name": "https://bitbucket.org/xi/libyaml/commits/2b9156756423e967cfd09a61d125d883fca6f4f2", "refsource": "CONFIRM", "url": "https://bitbucket.org/xi/libyaml/commits/2b9156756423e967cfd09a61d125d883fca6f4f2" }, { "name": "71349", "refsource": "BID", "url": "http://www.securityfocus.com/bid/71349" }, { "name": "DSA-3102", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2014/dsa-3102" }, { "name": "62174", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62174" }, { "name": "RHSA-2015:0112", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2015-0112.html" }, { "name": "[oss-security] 20141128 libyaml / YAML-LibYAML DoS", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2014/11/28/1" }, { "name": "MDVSA-2015:060", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:060" }, { "name": "USN-2461-3", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2461-3" }, { "name": "DSA-3115", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2014/dsa-3115" }, { "name": "openSUSE-SU-2015:0319", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00078.html" }, { "name": "[oss-security] 20141129 Re: Re: libyaml / YAML-LibYAML DoS", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2014/11/29/3" }, { "name": "62774", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62774" }, { "name": "[oss-security] 20141128 Re: libyaml / YAML-LibYAML DoS", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2014/11/28/8" }, { "name": "RHSA-2015:0260", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2015-0260.html" }, { "name": "62723", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62723" }, { "name": "USN-2461-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2461-1" }, { "name": "https://puppet.com/security/cve/cve-2014-9130", "refsource": "CONFIRM", "url": "https://puppet.com/security/cve/cve-2014-9130" }, { "name": "USN-2461-2", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2461-2" }, { "name": "62176", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62176" }, { "name": "https://bitbucket.org/xi/libyaml/issue/10/wrapped-strings-cause-assert-failure", "refsource": "MISC", "url": "https://bitbucket.org/xi/libyaml/issue/10/wrapped-strings-cause-assert-failure" }, { "name": "MDVSA-2014:242", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:242" }, { "name": "DSA-3103", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2014/dsa-3103" }, { "name": "60944", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60944" }, { "name": "openSUSE-SU-2016:1067", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2016-04/msg00050.html" }, { "name": "62164", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62164" }, { "name": "libyaml-cve20149130-dos(99047)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99047" }, { "name": "RHSA-2015:0100", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2015-0100.html" }, { "name": "http://linux.oracle.com/errata/ELSA-2015-0100.html", "refsource": "CONFIRM", "url": "http://linux.oracle.com/errata/ELSA-2015-0100.html" }, { "name": "59947", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59947" }, { "name": "http://advisories.mageia.org/MGASA-2014-0508.html", "refsource": "CONFIRM", "url": "http://advisories.mageia.org/MGASA-2014-0508.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-9130", "datePublished": "2014-12-08T16:00:00", "dateReserved": "2014-11-28T00:00:00", "dateUpdated": "2024-08-06T13:33:13.456Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2014-9130\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2014-12-08T16:59:04.450\",\"lastModified\":\"2025-04-12T10:46:40.837\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"scanner.c in LibYAML 0.1.5 and 0.1.6, as used in the YAML-LibYAML (aka YAML-XS) module for Perl, allows context-dependent attackers to cause a denial of service (assertion failure and crash) via vectors involving line-wrapping.\"},{\"lang\":\"es\",\"value\":\"scanner.c en LibYAML 0.1.5 y 0.1.6, utilizado en el m\u00f3dulo YAML-LibYAML (tambi\u00e9n conocido como YAML-XS) para Perl, permite a atacantes dependientes de contexto causar una denegaci\u00f3n de servicio (fallo de aserci\u00f3n y ca\u00edda) a trav\u00e9s de vectores que involucran la envoltura de l\u00edneas (line-wrapping).\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pyyaml:libyaml:0.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D405B896-62ED-4064-9A84-EAD93843B2F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pyyaml:libyaml:0.1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E9B1BDC-8920-4D46-9879-0E491797F188\"}]}]}],\"references\":[{\"url\":\"http://advisories.mageia.org/MGASA-2014-0508.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://linux.oracle.com/errata/ELSA-2015-0100.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2015-02/msg00078.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2016-04/msg00050.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-0100.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-0112.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-0260.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/59947\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/60944\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/62164\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/62174\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/62176\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/62705\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/62723\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/62774\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2014/dsa-3102\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2014/dsa-3103\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2014/dsa-3115\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2014:242\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2015:060\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2014/11/28/1\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2014/11/28/8\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2014/11/29/3\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/71349\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2461-1\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2461-2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2461-3\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://bitbucket.org/xi/libyaml/commits/2b9156756423e967cfd09a61d125d883fca6f4f2\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\"]},{\"url\":\"https://bitbucket.org/xi/libyaml/issue/10/wrapped-strings-cause-assert-failure\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/99047\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://puppet.com/security/cve/cve-2014-9130\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://advisories.mageia.org/MGASA-2014-0508.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://linux.oracle.com/errata/ELSA-2015-0100.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2015-02/msg00078.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2016-04/msg00050.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-0100.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-0112.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-0260.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/59947\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/60944\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/62164\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/62174\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/62176\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/62705\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/62723\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/62774\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2014/dsa-3102\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2014/dsa-3103\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2014/dsa-3115\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2014:242\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2015:060\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2014/11/28/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2014/11/28/8\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2014/11/29/3\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/71349\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2461-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2461-2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2461-3\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bitbucket.org/xi/libyaml/commits/2b9156756423e967cfd09a61d125d883fca6f4f2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"https://bitbucket.org/xi/libyaml/issue/10/wrapped-strings-cause-assert-failure\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/99047\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://puppet.com/security/cve/cve-2014-9130\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
suse-su-2015:0953-2
Vulnerability from csaf_suse
Published
2015-02-10 14:18
Modified
2015-02-10 14:18
Summary
Security update for perl-YAML-LibYAML
Notes
Title of the patch
Security update for perl-YAML-LibYAML
Description of the patch
perl-YAML-LibYAML was updated to fix three security issues.
These security issues were fixed:
- CVE-2013-6393: The yaml_parser_scan_tag_uri function in scanner.c in LibYAML before 0.1.5 performed an incorrect cast, which allowed remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted tags in a YAML document, which triggered a heap-based buffer overflow (bnc#860617, bnc#911782).
- CVE-2014-9130: scanner.c in LibYAML 0.1.5 and 0.1.6, as used in the YAML-LibYAML (aka YAML-XS) module for Perl, allowed context-dependent attackers to cause a denial of service (assertion failure and crash) via vectors involving line-wrapping (bnc#907809, bnc#911782).
- CVE-2014-2525: Heap-based buffer overflow in the yaml_parser_scan_uri_escapes function in LibYAML before 0.1.6 allowed context-dependent attackers to execute arbitrary code via a long sequence of percent-encoded characters in a URI in a YAML file (bnc#868944, bnc#911782).
Patchnames
SUSE-SLE-DESKTOP-12-2015-215,SUSE-SLE-SERVER-12-2015-215
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for perl-YAML-LibYAML", "title": "Title of the patch" }, { "category": "description", "text": "perl-YAML-LibYAML was updated to fix three security issues.\n\nThese security issues were fixed:\n- CVE-2013-6393: The yaml_parser_scan_tag_uri function in scanner.c in LibYAML before 0.1.5 performed an incorrect cast, which allowed remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted tags in a YAML document, which triggered a heap-based buffer overflow (bnc#860617, bnc#911782).\n- CVE-2014-9130: scanner.c in LibYAML 0.1.5 and 0.1.6, as used in the YAML-LibYAML (aka YAML-XS) module for Perl, allowed context-dependent attackers to cause a denial of service (assertion failure and crash) via vectors involving line-wrapping (bnc#907809, bnc#911782).\n- CVE-2014-2525: Heap-based buffer overflow in the yaml_parser_scan_uri_escapes function in LibYAML before 0.1.6 allowed context-dependent attackers to execute arbitrary code via a long sequence of percent-encoded characters in a URI in a YAML file (bnc#868944, bnc#911782).\n ", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-DESKTOP-12-2015-215,SUSE-SLE-SERVER-12-2015-215", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2015_0953-2.json" }, { "category": "self", "summary": "URL for SUSE-SU-2015:0953-2", "url": "https://www.suse.com/support/update/announcement/2015/suse-su-20150953-2/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2015:0953-2", "url": "https://lists.suse.com/pipermail/sle-security-updates/2015-May/001412.html" }, { "category": "self", "summary": "SUSE Bug 860617", "url": "https://bugzilla.suse.com/860617" }, { "category": "self", "summary": "SUSE Bug 868944", "url": "https://bugzilla.suse.com/868944" }, { "category": "self", "summary": "SUSE Bug 907809", "url": "https://bugzilla.suse.com/907809" }, { "category": "self", "summary": "SUSE Bug 911782", "url": "https://bugzilla.suse.com/911782" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6393 page", "url": "https://www.suse.com/security/cve/CVE-2013-6393/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-2525 page", "url": "https://www.suse.com/security/cve/CVE-2014-2525/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9130 page", "url": "https://www.suse.com/security/cve/CVE-2014-9130/" } ], "title": "Security update for perl-YAML-LibYAML", "tracking": { "current_release_date": "2015-02-10T14:18:22Z", "generator": { "date": "2015-02-10T14:18:22Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2015:0953-2", "initial_release_date": "2015-02-10T14:18:22Z", "revision_history": [ { "date": "2015-02-10T14:18:22Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "perl-YAML-LibYAML-0.38-10.1.ppc64le", "product": { "name": "perl-YAML-LibYAML-0.38-10.1.ppc64le", "product_id": "perl-YAML-LibYAML-0.38-10.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "perl-YAML-LibYAML-0.38-10.1.s390x", "product": { "name": "perl-YAML-LibYAML-0.38-10.1.s390x", "product_id": "perl-YAML-LibYAML-0.38-10.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "perl-YAML-LibYAML-0.38-10.1.x86_64", "product": { "name": "perl-YAML-LibYAML-0.38-10.1.x86_64", "product_id": "perl-YAML-LibYAML-0.38-10.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 12", "product": { "name": "SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sled:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12", "product": { "name": "SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "perl-YAML-LibYAML-0.38-10.1.x86_64 as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:perl-YAML-LibYAML-0.38-10.1.x86_64" }, "product_reference": "perl-YAML-LibYAML-0.38-10.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "perl-YAML-LibYAML-0.38-10.1.ppc64le as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:perl-YAML-LibYAML-0.38-10.1.ppc64le" }, "product_reference": "perl-YAML-LibYAML-0.38-10.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "perl-YAML-LibYAML-0.38-10.1.s390x as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:perl-YAML-LibYAML-0.38-10.1.s390x" }, "product_reference": "perl-YAML-LibYAML-0.38-10.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "perl-YAML-LibYAML-0.38-10.1.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:perl-YAML-LibYAML-0.38-10.1.x86_64" }, "product_reference": "perl-YAML-LibYAML-0.38-10.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "perl-YAML-LibYAML-0.38-10.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:perl-YAML-LibYAML-0.38-10.1.ppc64le" }, "product_reference": "perl-YAML-LibYAML-0.38-10.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "perl-YAML-LibYAML-0.38-10.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:perl-YAML-LibYAML-0.38-10.1.s390x" }, "product_reference": "perl-YAML-LibYAML-0.38-10.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "perl-YAML-LibYAML-0.38-10.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:perl-YAML-LibYAML-0.38-10.1.x86_64" }, "product_reference": "perl-YAML-LibYAML-0.38-10.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2013-6393", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6393" } ], "notes": [ { "category": "general", "text": "The yaml_parser_scan_tag_uri function in scanner.c in LibYAML before 0.1.5 performs an incorrect cast, which allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted tags in a YAML document, which triggers a heap-based buffer overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:perl-YAML-LibYAML-0.38-10.1.x86_64", "SUSE Linux Enterprise Server 12:perl-YAML-LibYAML-0.38-10.1.ppc64le", "SUSE Linux Enterprise Server 12:perl-YAML-LibYAML-0.38-10.1.s390x", "SUSE Linux Enterprise Server 12:perl-YAML-LibYAML-0.38-10.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:perl-YAML-LibYAML-0.38-10.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:perl-YAML-LibYAML-0.38-10.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:perl-YAML-LibYAML-0.38-10.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6393", "url": "https://www.suse.com/security/cve/CVE-2013-6393" }, { "category": "external", "summary": "SUSE Bug 860617 for CVE-2013-6393", "url": "https://bugzilla.suse.com/860617" }, { "category": "external", "summary": "SUSE Bug 911782 for CVE-2013-6393", "url": "https://bugzilla.suse.com/911782" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:perl-YAML-LibYAML-0.38-10.1.x86_64", "SUSE Linux Enterprise Server 12:perl-YAML-LibYAML-0.38-10.1.ppc64le", "SUSE Linux Enterprise Server 12:perl-YAML-LibYAML-0.38-10.1.s390x", "SUSE Linux Enterprise Server 12:perl-YAML-LibYAML-0.38-10.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:perl-YAML-LibYAML-0.38-10.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:perl-YAML-LibYAML-0.38-10.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:perl-YAML-LibYAML-0.38-10.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-02-10T14:18:22Z", "details": "moderate" } ], "title": "CVE-2013-6393" }, { "cve": "CVE-2014-2525", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-2525" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in the yaml_parser_scan_uri_escapes function in LibYAML before 0.1.6 allows context-dependent attackers to execute arbitrary code via a long sequence of percent-encoded characters in a URI in a YAML file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:perl-YAML-LibYAML-0.38-10.1.x86_64", "SUSE Linux Enterprise Server 12:perl-YAML-LibYAML-0.38-10.1.ppc64le", "SUSE Linux Enterprise Server 12:perl-YAML-LibYAML-0.38-10.1.s390x", "SUSE Linux Enterprise Server 12:perl-YAML-LibYAML-0.38-10.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:perl-YAML-LibYAML-0.38-10.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:perl-YAML-LibYAML-0.38-10.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:perl-YAML-LibYAML-0.38-10.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-2525", "url": "https://www.suse.com/security/cve/CVE-2014-2525" }, { "category": "external", "summary": "SUSE Bug 868944 for CVE-2014-2525", "url": "https://bugzilla.suse.com/868944" }, { "category": "external", "summary": "SUSE Bug 911782 for CVE-2014-2525", "url": "https://bugzilla.suse.com/911782" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:perl-YAML-LibYAML-0.38-10.1.x86_64", "SUSE Linux Enterprise Server 12:perl-YAML-LibYAML-0.38-10.1.ppc64le", "SUSE Linux Enterprise Server 12:perl-YAML-LibYAML-0.38-10.1.s390x", "SUSE Linux Enterprise Server 12:perl-YAML-LibYAML-0.38-10.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:perl-YAML-LibYAML-0.38-10.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:perl-YAML-LibYAML-0.38-10.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:perl-YAML-LibYAML-0.38-10.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-02-10T14:18:22Z", "details": "moderate" } ], "title": "CVE-2014-2525" }, { "cve": "CVE-2014-9130", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9130" } ], "notes": [ { "category": "general", "text": "scanner.c in LibYAML 0.1.5 and 0.1.6, as used in the YAML-LibYAML (aka YAML-XS) module for Perl, allows context-dependent attackers to cause a denial of service (assertion failure and crash) via vectors involving line-wrapping.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:perl-YAML-LibYAML-0.38-10.1.x86_64", "SUSE Linux Enterprise Server 12:perl-YAML-LibYAML-0.38-10.1.ppc64le", "SUSE Linux Enterprise Server 12:perl-YAML-LibYAML-0.38-10.1.s390x", "SUSE Linux Enterprise Server 12:perl-YAML-LibYAML-0.38-10.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:perl-YAML-LibYAML-0.38-10.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:perl-YAML-LibYAML-0.38-10.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:perl-YAML-LibYAML-0.38-10.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9130", "url": "https://www.suse.com/security/cve/CVE-2014-9130" }, { "category": "external", "summary": "SUSE Bug 907809 for CVE-2014-9130", "url": "https://bugzilla.suse.com/907809" }, { "category": "external", "summary": "SUSE Bug 911782 for CVE-2014-9130", "url": "https://bugzilla.suse.com/911782" }, { "category": "external", "summary": "SUSE Bug 921588 for CVE-2014-9130", "url": "https://bugzilla.suse.com/921588" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:perl-YAML-LibYAML-0.38-10.1.x86_64", "SUSE Linux Enterprise Server 12:perl-YAML-LibYAML-0.38-10.1.ppc64le", "SUSE Linux Enterprise Server 12:perl-YAML-LibYAML-0.38-10.1.s390x", "SUSE Linux Enterprise Server 12:perl-YAML-LibYAML-0.38-10.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:perl-YAML-LibYAML-0.38-10.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:perl-YAML-LibYAML-0.38-10.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:perl-YAML-LibYAML-0.38-10.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-02-10T14:18:22Z", "details": "moderate" } ], "title": "CVE-2014-9130" } ] }
suse-su-2015:0953-1
Vulnerability from csaf_suse
Published
2015-02-10 14:18
Modified
2015-02-10 14:18
Summary
Security update for perl-YAML-LibYAML
Notes
Title of the patch
Security update for perl-YAML-LibYAML
Description of the patch
perl-YAML-LibYAML was updated to fix three security issues.
These security issues were fixed:
- CVE-2013-6393: The yaml_parser_scan_tag_uri function in scanner.c in LibYAML before 0.1.5 performed an incorrect cast, which allowed remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted tags in a YAML document, which triggered a heap-based buffer overflow (bnc#860617, bnc#911782).
- CVE-2014-9130: scanner.c in LibYAML 0.1.5 and 0.1.6, as used in the YAML-LibYAML (aka YAML-XS) module for Perl, allowed context-dependent attackers to cause a denial of service (assertion failure and crash) via vectors involving line-wrapping (bnc#907809, bnc#911782).
- CVE-2014-2525: Heap-based buffer overflow in the yaml_parser_scan_uri_escapes function in LibYAML before 0.1.6 allowed context-dependent attackers to execute arbitrary code via a long sequence of percent-encoded characters in a URI in a YAML file (bnc#868944, bnc#911782).
Patchnames
SUSE-SLE-SERVER-12-2015-215
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for perl-YAML-LibYAML", "title": "Title of the patch" }, { "category": "description", "text": "perl-YAML-LibYAML was updated to fix three security issues.\n\nThese security issues were fixed:\n- CVE-2013-6393: The yaml_parser_scan_tag_uri function in scanner.c in LibYAML before 0.1.5 performed an incorrect cast, which allowed remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted tags in a YAML document, which triggered a heap-based buffer overflow (bnc#860617, bnc#911782).\n- CVE-2014-9130: scanner.c in LibYAML 0.1.5 and 0.1.6, as used in the YAML-LibYAML (aka YAML-XS) module for Perl, allowed context-dependent attackers to cause a denial of service (assertion failure and crash) via vectors involving line-wrapping (bnc#907809, bnc#911782).\n- CVE-2014-2525: Heap-based buffer overflow in the yaml_parser_scan_uri_escapes function in LibYAML before 0.1.6 allowed context-dependent attackers to execute arbitrary code via a long sequence of percent-encoded characters in a URI in a YAML file (bnc#868944, bnc#911782).\n ", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SERVER-12-2015-215", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2015_0953-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2015:0953-1", "url": "https://www.suse.com/support/update/announcement/2015/suse-su-20150953-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2015:0953-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2015-May/001411.html" }, { "category": "self", "summary": "SUSE Bug 860617", "url": "https://bugzilla.suse.com/860617" }, { "category": "self", "summary": "SUSE Bug 868944", "url": "https://bugzilla.suse.com/868944" }, { "category": "self", "summary": "SUSE Bug 907809", "url": "https://bugzilla.suse.com/907809" }, { "category": "self", "summary": "SUSE Bug 911782", "url": "https://bugzilla.suse.com/911782" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6393 page", "url": "https://www.suse.com/security/cve/CVE-2013-6393/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-2525 page", "url": "https://www.suse.com/security/cve/CVE-2014-2525/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9130 page", "url": "https://www.suse.com/security/cve/CVE-2014-9130/" } ], "title": "Security update for perl-YAML-LibYAML", "tracking": { "current_release_date": "2015-02-10T14:18:22Z", "generator": { "date": "2015-02-10T14:18:22Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2015:0953-1", "initial_release_date": "2015-02-10T14:18:22Z", "revision_history": [ { "date": "2015-02-10T14:18:22Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "perl-YAML-LibYAML-0.38-10.1.ppc64le", "product": { "name": "perl-YAML-LibYAML-0.38-10.1.ppc64le", "product_id": "perl-YAML-LibYAML-0.38-10.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "perl-YAML-LibYAML-0.38-10.1.s390x", "product": { "name": "perl-YAML-LibYAML-0.38-10.1.s390x", "product_id": "perl-YAML-LibYAML-0.38-10.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "perl-YAML-LibYAML-0.38-10.1.x86_64", "product": { "name": "perl-YAML-LibYAML-0.38-10.1.x86_64", "product_id": "perl-YAML-LibYAML-0.38-10.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12", "product": { "name": "SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "perl-YAML-LibYAML-0.38-10.1.ppc64le as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:perl-YAML-LibYAML-0.38-10.1.ppc64le" }, "product_reference": "perl-YAML-LibYAML-0.38-10.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "perl-YAML-LibYAML-0.38-10.1.s390x as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:perl-YAML-LibYAML-0.38-10.1.s390x" }, "product_reference": "perl-YAML-LibYAML-0.38-10.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "perl-YAML-LibYAML-0.38-10.1.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:perl-YAML-LibYAML-0.38-10.1.x86_64" }, "product_reference": "perl-YAML-LibYAML-0.38-10.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "perl-YAML-LibYAML-0.38-10.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:perl-YAML-LibYAML-0.38-10.1.ppc64le" }, "product_reference": "perl-YAML-LibYAML-0.38-10.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "perl-YAML-LibYAML-0.38-10.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:perl-YAML-LibYAML-0.38-10.1.s390x" }, "product_reference": "perl-YAML-LibYAML-0.38-10.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "perl-YAML-LibYAML-0.38-10.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:perl-YAML-LibYAML-0.38-10.1.x86_64" }, "product_reference": "perl-YAML-LibYAML-0.38-10.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2013-6393", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6393" } ], "notes": [ { "category": "general", "text": "The yaml_parser_scan_tag_uri function in scanner.c in LibYAML before 0.1.5 performs an incorrect cast, which allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted tags in a YAML document, which triggers a heap-based buffer overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12:perl-YAML-LibYAML-0.38-10.1.ppc64le", "SUSE Linux Enterprise Server 12:perl-YAML-LibYAML-0.38-10.1.s390x", "SUSE Linux Enterprise Server 12:perl-YAML-LibYAML-0.38-10.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:perl-YAML-LibYAML-0.38-10.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:perl-YAML-LibYAML-0.38-10.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:perl-YAML-LibYAML-0.38-10.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6393", "url": "https://www.suse.com/security/cve/CVE-2013-6393" }, { "category": "external", "summary": "SUSE Bug 860617 for CVE-2013-6393", "url": "https://bugzilla.suse.com/860617" }, { "category": "external", "summary": "SUSE Bug 911782 for CVE-2013-6393", "url": "https://bugzilla.suse.com/911782" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12:perl-YAML-LibYAML-0.38-10.1.ppc64le", "SUSE Linux Enterprise Server 12:perl-YAML-LibYAML-0.38-10.1.s390x", "SUSE Linux Enterprise Server 12:perl-YAML-LibYAML-0.38-10.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:perl-YAML-LibYAML-0.38-10.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:perl-YAML-LibYAML-0.38-10.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:perl-YAML-LibYAML-0.38-10.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-02-10T14:18:22Z", "details": "moderate" } ], "title": "CVE-2013-6393" }, { "cve": "CVE-2014-2525", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-2525" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in the yaml_parser_scan_uri_escapes function in LibYAML before 0.1.6 allows context-dependent attackers to execute arbitrary code via a long sequence of percent-encoded characters in a URI in a YAML file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12:perl-YAML-LibYAML-0.38-10.1.ppc64le", "SUSE Linux Enterprise Server 12:perl-YAML-LibYAML-0.38-10.1.s390x", "SUSE Linux Enterprise Server 12:perl-YAML-LibYAML-0.38-10.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:perl-YAML-LibYAML-0.38-10.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:perl-YAML-LibYAML-0.38-10.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:perl-YAML-LibYAML-0.38-10.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-2525", "url": "https://www.suse.com/security/cve/CVE-2014-2525" }, { "category": "external", "summary": "SUSE Bug 868944 for CVE-2014-2525", "url": "https://bugzilla.suse.com/868944" }, { "category": "external", "summary": "SUSE Bug 911782 for CVE-2014-2525", "url": "https://bugzilla.suse.com/911782" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12:perl-YAML-LibYAML-0.38-10.1.ppc64le", "SUSE Linux Enterprise Server 12:perl-YAML-LibYAML-0.38-10.1.s390x", "SUSE Linux Enterprise Server 12:perl-YAML-LibYAML-0.38-10.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:perl-YAML-LibYAML-0.38-10.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:perl-YAML-LibYAML-0.38-10.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:perl-YAML-LibYAML-0.38-10.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-02-10T14:18:22Z", "details": "moderate" } ], "title": "CVE-2014-2525" }, { "cve": "CVE-2014-9130", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9130" } ], "notes": [ { "category": "general", "text": "scanner.c in LibYAML 0.1.5 and 0.1.6, as used in the YAML-LibYAML (aka YAML-XS) module for Perl, allows context-dependent attackers to cause a denial of service (assertion failure and crash) via vectors involving line-wrapping.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12:perl-YAML-LibYAML-0.38-10.1.ppc64le", "SUSE Linux Enterprise Server 12:perl-YAML-LibYAML-0.38-10.1.s390x", "SUSE Linux Enterprise Server 12:perl-YAML-LibYAML-0.38-10.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:perl-YAML-LibYAML-0.38-10.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:perl-YAML-LibYAML-0.38-10.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:perl-YAML-LibYAML-0.38-10.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9130", "url": "https://www.suse.com/security/cve/CVE-2014-9130" }, { "category": "external", "summary": "SUSE Bug 907809 for CVE-2014-9130", "url": "https://bugzilla.suse.com/907809" }, { "category": "external", "summary": "SUSE Bug 911782 for CVE-2014-9130", "url": "https://bugzilla.suse.com/911782" }, { "category": "external", "summary": "SUSE Bug 921588 for CVE-2014-9130", "url": "https://bugzilla.suse.com/921588" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12:perl-YAML-LibYAML-0.38-10.1.ppc64le", "SUSE Linux Enterprise Server 12:perl-YAML-LibYAML-0.38-10.1.s390x", "SUSE Linux Enterprise Server 12:perl-YAML-LibYAML-0.38-10.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:perl-YAML-LibYAML-0.38-10.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:perl-YAML-LibYAML-0.38-10.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:perl-YAML-LibYAML-0.38-10.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-02-10T14:18:22Z", "details": "moderate" } ], "title": "CVE-2014-9130" } ] }
suse-ru-2015:0611-1
Vulnerability from csaf_suse
Published
2015-02-25 20:05
Modified
2015-02-25 20:05
Summary
Recommended update for SUSE Manager Server 2.1
Notes
Title of the patch
Recommended update for SUSE Manager Server 2.1
Description of the patch
This collective update for SUSE Manager Server 2.1 provides the following
new features:
* Connect SUSE Manager to the SUSE Customer Center.
* Manage SLE12 systems.
* ISS: export/import information about cloned channels to support
Service Pack migration on ISS slaves. (FATE#317789)
* New API calls: system.scheduleSPMigration(),
system.scheduleDistUpgrade(). (FATE#314785, FATE#314340)
Additionally, several issues have been fixed:
auditlog-keeper:
* Fix value too long for type character varying(2048). (bnc#872351)
* Fix init.d script restart. (bsc#872029)
cobbler:
* Require syslinux-x86_64 on s390x. (bsc#884051)
* Fix fetching of profiles for auto-installation. (bsc#880936)
* Fix port guessing in koan. (bsc#855389)
* Add 'copy-default' option to grubby-compat. (bsc#855389)
* Handle elilo in SUSE. (bsc#855389)
* Fix wrong option 'text' in SUSE environment. (bsc#901058)
* Fix re-installation on SLE with static network configuration.
(bsc#883487)
* Add RHEL 7 as a valid operating system version.
oracle-config:
* No need to pre-require Apache as its user and group are available in
the base system.
osad:
* Enable and install osad during first installation. (bsc#901958)
pxe-default-image:
* Add bind-utils (dig) to packagelist. (bsc#889739)
* Wait for gateway to become available before register. (bsc#895001)
rhnlib:
* Ensure bytes strings are sent to pyOpenSSL. (bnc#880388)
rhnpush:
* Add default path structure to proxy lookaside that avoids collisions.
sm-ncc-sync-data:
* Add SUSE Cloud 4 channels. (bnc#883057)
* Add channels for SUSE Manager Server 2.1 s390x.
* Fix parent label of the LTSS channel for SLMS.
* Add ATI and nVidia channels for SLED11-SP3. (bsc#901108)
* Add support for RES7 in SUSE Manager. (bsc#897723, bsc#893608)
smdba:
* Fix 'system check breaks backup and other configuration'.
* Implement rotating PostgreSQL backup. (bsc#896244)
* Space reclamation caused ORA-00942: table or view does not exist.
(bsc#906850)
* Archival of PosgreSQL transaction log does not recover in case of no
space left on device. (bsc#915140)
spacecmd:
* Fix listupgrades. (bsc#892707)
* Make print_result a static method of SpacewalkShell. (bsc#889605)
* Call listAutoinstallableChannels() for listing distributions.
(bsc#887879)
* Fix spacecmd schedule listing. (bsc#902494)
* Fix call of setCustomOptions() during kickstart_importjson.
(bsc#879904)
* Fix configchannel export: do not create 'contents' key for
directories. (bsc#908849)
spacewalk-backend:
* Insert update tag at the correct place for SLE12. (bsc#907677)
* Trigger generation of metadata if the repo contains no packages.
(bsc#870159)
* Convert mtime to localtime to prevent invalid times because of DST.
(bsc#914437)
* Do not exit with error if a vendor channel has no URL associated.
(bsc#914260)
* Convert empty string to null for DMI values. (bsc#911272)
spacewalk-branding:
* CVE patches adapted for colour blind users. (bnc#872298)
* Underline in icons is removed. (bnc#880001)
* Fix link to macro documentation. (bsc#895961)
* Fix branding in error message. (bsc#902503)
spacewalk-certs-tools:
* Fix removal of existing host key entries. (bsc#886391)
* Remove duplicates from authorized_keys2 as well. (bsc#885889)
* Do not allow registering a SUSE Manager server against itself.
(bsc#841731)
spacewalk-client-tools:
* Allow unicode characters in proxy username and password.
* Send correct hostname. (bsc#887538)
spacewalk-config:
* Add recommended Apache settings from the Security Team.
spacewalk-java:
* Fix human dates now() staying unmodified. (bnc#880081)
* Allow for null evr and archs on event history detail. (bnc#880327)
* Disable form autocompletion in some places. (bnc#879998)
* Fix datepicker time at xx:xx PM pre-filled with xx:xx AM.
(bnc#881522)
* Fixed package upgrade via SSM when using the Oracle DB as backend.
(bnc#889721)
* This update fixes various cross-site scripting (XSS) issues in
spacewalk-java. (CVE-2014-3654, bnc#902182)
* Sync correct repositories. (bnc#904959)
* Fix pxt page link to point to the ported version of that page.
(bsc#903720)
* Correctly apply patches to multiple systems in SSM. (bsc#898242)
* Fix CVE audit when some packages of a patch are already installed.
(bsc#899266)
* Download CSV button does not export all columns ('Base Channel'
missing). (bsc#896238)
* Read and display only a limited number of logfile lines. (bsc#883009)
* Fix package upgrade via SSM. (bsc#889721)
* Fix logrotate for /var/log/rhn/rhn_web_api.log. (bsc#884081)
* Throw channel name exception if name is already used. (bnc#901675)
* Don't commit when XMLRPCExceptions are thrown. (bsc#908320)
* Remove 'Select All' button from system currency report. (bsc#653265)
* Fix documentation search. (bsc#875452)
* Add API listAutoinstallableChannels(). (bsc#887879)
* Avoid ArrayIndexOutOfBoundsException with invalid URLs. (bsc#892711)
* Avoid NumberFormatException in case of invalid URL. (bsc#892711)
* Lookup kickstart tree only when org is found. (bsc#892711)
* Fix NPE on GET /rhn/common/DownloadFile.do. (bsc#892711)
* Port of the advanced provisioning option page to bootstrap.
(bnc#862408)
* mgr-sync refresh sets wrong permissions on JSON files. (bnc#907337)
* Fix link to macro documentation. (bsc#895961)
* Forward to 'raw mode' page in case this is an uploaded profile.
(bsc#904841)
* Enlarge big text area to use more available screen space.
(bnc#867836)
* Fix links to monitoring documentation. (bsc#906887)
* Fix install type detection. (bsc#875231)
* Point 'Register Clients' link to 'Client Configuration Guide'.
(bsc#880026)
* Change order of installer type: prefer SUSE Linux. (bsc#860299)
* Fix ISE when clicking system currency. (bnc#905530)
* Set cobbler hostname variable when calling system.createSystemRecord.
(bnc#904699)
* Fix wrong install=http://nullnull line when calling
system.createSystemRecord. (bnc#904699)
* Explain snapshot/rollback behavior better. (bsc#808947)
* Fix patch syncing: prevent hibernate.NonUniqueObjectException
androllback. (bsc#903880)
* Remove 'Add Selected to SSM' from system overview page. (bsc#901776)
* Fix CVE audit in case of multi-version package installed and patch in
multi channels. (bsc#903723)
* Update channel family membership when channel is updated.
(bsc#901193)
* Add log warning if uploaded file size > 1MB. (bnc#901927)
* Fix channel package compare. (bsc#904690)
* Fix automatic configuration file deployment via snippet. (bsc#898426)
* Add client hostname or IP to log messages. (bsc#904732)
* Fixed copying text from kickstart snippets. (bsc#880087)
* Fix auditlog config yaml syntax. (bsc#913221)
* Show Proxy tab if system is a proxy even when assigned to cloned
channels. (bsc#913939)
* Fixed uncaught error which prevent correct error handling.
(bsc#858971)
* Fix NPE by setting max_members to 0 instead of NULL. (bsc#912035)
* Fix more cross-site-scripting (XSS) issues. (CVE-2014-7811,
bsc#902915)
* Fix basic authentication for HTTP proxies. (bsc#912057)
* Accept repos with same SCC ID and different URLs. (bsc#911808)
* Avoid mgr-sync-refresh failure because clear_log_id was not called.
(bsc#911166)
* Fix cross-site-scripting (XSS) issue in system-group (CVE-2014-7812,
bsc#912886)
* Fix 'Select All' buttons display on rhn:list and make it consistent
with new rl:list. (bsc#909724)
* Fix List tag missing submit parameter for 'Select All' and others.
(bnc#909724)
* Sort filelist in configfile.compare event history alphabetically.
(bsc#910243)
* Allow parenthesis in system group description. (bsc#903064)
* Provide new API documentation in PDF format. (bsc#896029)
* Update the example scripts section. (bsc#896029)
* Fixed wording issues on package lock page. (bsc#880022)
* Make text more clear for package profile sync. (bsc#884350)
spacewalk-reports:
* Added channel- and server-group-ids to activation-keys.
* Added spacewalk-report for systems with extra packages.
spacewalk-search:
* Fix package searching in shared channels.
spacewalk-setup:
* Setup /etc/sudoers in SUSE Manager upgrade scripts (bnc#881711)
* No activation if database population should be skipped. (bsc#900956)
* Do not enable spacewalk-service in runlevel 4. (bsc#879992)
spacewalk-utils:
* Fixed spacewalk-hostname-rename to work with PostgreSQL backend.
* Added limitation of spacewalk-clone-by-date for RHEL4 and earlier.
* Add openSUSE 13.2 repositories to spacewalk-common-channels.
* Improve clone-by-date dependency resolution.
* Add CentOS 7 and EPEL 7 channels.
* Fix error if blacklist / removelist is not in scbd configurationfile.
spacewalk-web:
* Fix links to monitoring documentation. (bsc#906887)
* Show Proxy tab if system is a proxy even when assigned to cloned
channels. (bsc#913939)
supportutils-plugin-susemanager:
* Write current service and repository configuration into
supportconfig.
susemanager-manuals_en, susemanager-jsp_en:
* Clarification about supported Web browsers. (bsc#889905)
* Update text and image files. (bnc#907527)
* Document NCC to SCC switch with SUSE Manager 2.1. (bnc#907106,
bnc#907643, bnc#907645, bnc#907646)
* SUSE Manager server update description. (bnc#902373)
* Activation keys and packages. (bnc#767279)
* Cobbler (bnc#880027), Link fix (bnc#881225), Wagon (bnc#884366)
* Install and ship the built PDFs. (bnc#907086)
* Update text and image files (bsc#910494).
* Firewall rules are incomplete - ssh-push and ssh-push-tunnel settings
missing. (bsc#904703)
* Document SP migration and ISS. (bsc#913215, partially).
* Fix 'beta packages' mentioned in documentation. (bsc#886421).
* User guide: Snapshots: clarify snaphot usage. (bsc#906851).
* Document maximal supported configuration file limit. (bsc#910482).
susemanager-schema:
* Add SLE 12 distribution targets to database.
* Fix evr_t schema upgrade. (bsc#881111)
* Allow evr_t to be compared with NULL in Oracle. (bsc#881111)
* Add support to ppc64le architecture.
* Fix migration script names to fix bare-metal registration.
(bsc#896109)
* Create regular index instead and have one migration per DB.
(bsc#905072)
* Drop unique index on package ids. (bsc#905072)
* Fix NPE by setting max_members to 0 instead of NULL. (bsc#912035)
* Fix old migration for future reference. (bsc#911180)
* Avoid NPE when migrating to SCC on Oracle migrated from 1.7.
(bsc#911180)
susemanager:
* Update the sudoers file after SUSE Manager upgrade. (bnc#881711)
* Fix oracle2postgres.sh (database configuration).
* Replace /etc/motd after setup. (bsc#883379)
* Make mgr-create-bootstrap-repo SCC and SLE 12 aware.
* Abort setup when invalid SSL country code given. (bnc#882468)
* Use noRepoSync parameter always.
* Fixed error message on exception in mgr-sync. (bnc#905263)
* Fixed add product to not trigger redundant addition of base channel.
(bnc#901928)
* Ask for the authentication beforehand. (bsc#908317)
susemanager-sync-data:
* Add channels for Public Cloud Module. (bsc#907586)
* Add new channel families SLE-WE and SLE-LP.
* Add ATI and nVidia channels for SLED11-SP3. (bsc#901108)
* Add channels for IBM-DLPAR for SLE12 ppc64le.
* Added support for RES7 in SUSE Manager. (bsc#897723, bsc#893608)
suseRegisterInfo:
* Re-add legacy suse_register_info to successfully perform the update.
(bsc#898428)
zypp-plugin-spacewalk:
* Check for retrieveOnly option in up2date configuration and set
download_only. (bsc#896254)
* Changed the spec file to force usage of the official python VM.
(bsc#889363)
yum:
* Preserve query parameters in URLs. (bsc#896844)
struts:
* CVE-2014-0114: The ActionForm object in Apache Struts 1.x through
1.3.10 allows remote attackers to 'manipulate' the ClassLoader and
execute arbitrary code via the class parameter, which is passed to
the getClass method.
apache2-mod_wsgi:
* CVE-2014-0242: Information exposure. (bnc#878553)
* CVE-2014-0240: Local privilege escalation. (bnc#878550)
* CVE-2014-8583: Failure to handle errors when attempting to drop group
privileges. (bnc#903961)
libyaml-0-2:
* Assert failure when processing wrapped strings (bnc#907809,
CVE-2014-9130)
tanukiwrapper:
* Allow more than 4G as -Xmx option. (bsc#914900)
The following new packages have been added to the product:
susemanager-sync-data, google-gson, python-enum34.
How to apply this update:
1. Log in as root user to the SUSE Manager server.
2. Stop the Spacewalk service: spacewalk-service stop
3. Apply the patch using either zypper patch or YaST Online Update.
4. Upgrade the database schema with spacewalk-schema-upgrade
5. Start the Spacewalk service: spacewalk-service start
Security Issues:
* CVE-2014-0114
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0114>
* CVE-2014-0240
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0240>
* CVE-2014-0242
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0242>
* CVE-2014-3654
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3654>
* CVE-2014-7811
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7811>
* CVE-2014-7812
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7812>
* CVE-2014-8583
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8583>
* CVE-2014-9130
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9130>
Patchnames
sleman21-suse-manager-201503
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Recommended update for SUSE Manager Server 2.1", "title": "Title of the patch" }, { "category": "description", "text": "\nThis collective update for SUSE Manager Server 2.1 provides the following \nnew features:\n\n * Connect SUSE Manager to the SUSE Customer Center.\n * Manage SLE12 systems.\n * ISS: export/import information about cloned channels to support\n Service Pack migration on ISS slaves. (FATE#317789)\n * New API calls: system.scheduleSPMigration(),\n system.scheduleDistUpgrade(). (FATE#314785, FATE#314340)\n\nAdditionally, several issues have been fixed:\n\nauditlog-keeper:\n\n * Fix value too long for type character varying(2048). (bnc#872351)\n * Fix init.d script restart. (bsc#872029)\n\ncobbler:\n\n * Require syslinux-x86_64 on s390x. (bsc#884051)\n * Fix fetching of profiles for auto-installation. (bsc#880936)\n * Fix port guessing in koan. (bsc#855389)\n * Add \u0027copy-default\u0027 option to grubby-compat. (bsc#855389)\n * Handle elilo in SUSE. (bsc#855389)\n * Fix wrong option \u0027text\u0027 in SUSE environment. (bsc#901058)\n * Fix re-installation on SLE with static network configuration.\n (bsc#883487)\n * Add RHEL 7 as a valid operating system version.\n\noracle-config:\n\n * No need to pre-require Apache as its user and group are available in\n the base system.\n\nosad:\n\n * Enable and install osad during first installation. (bsc#901958)\n\npxe-default-image:\n\n * Add bind-utils (dig) to packagelist. (bsc#889739)\n * Wait for gateway to become available before register. (bsc#895001)\n\nrhnlib:\n\n * Ensure bytes strings are sent to pyOpenSSL. (bnc#880388)\n\nrhnpush:\n\n * Add default path structure to proxy lookaside that avoids collisions.\n\nsm-ncc-sync-data:\n\n * Add SUSE Cloud 4 channels. (bnc#883057)\n * Add channels for SUSE Manager Server 2.1 s390x.\n * Fix parent label of the LTSS channel for SLMS.\n * Add ATI and nVidia channels for SLED11-SP3. (bsc#901108)\n * Add support for RES7 in SUSE Manager. (bsc#897723, bsc#893608)\n\nsmdba:\n\n * Fix \u0027system check breaks backup and other configuration\u0027.\n * Implement rotating PostgreSQL backup. (bsc#896244)\n * Space reclamation caused ORA-00942: table or view does not exist.\n (bsc#906850)\n * Archival of PosgreSQL transaction log does not recover in case of no\n space left on device. (bsc#915140)\n\nspacecmd:\n\n * Fix listupgrades. (bsc#892707)\n * Make print_result a static method of SpacewalkShell. (bsc#889605)\n * Call listAutoinstallableChannels() for listing distributions.\n (bsc#887879)\n * Fix spacecmd schedule listing. (bsc#902494)\n * Fix call of setCustomOptions() during kickstart_importjson.\n (bsc#879904)\n * Fix configchannel export: do not create \u0027contents\u0027 key for\n directories. (bsc#908849)\n\nspacewalk-backend:\n\n * Insert update tag at the correct place for SLE12. (bsc#907677)\n * Trigger generation of metadata if the repo contains no packages.\n (bsc#870159)\n * Convert mtime to localtime to prevent invalid times because of DST.\n (bsc#914437)\n * Do not exit with error if a vendor channel has no URL associated.\n (bsc#914260)\n * Convert empty string to null for DMI values. (bsc#911272)\n\nspacewalk-branding:\n\n * CVE patches adapted for colour blind users. (bnc#872298)\n * Underline in icons is removed. (bnc#880001)\n * Fix link to macro documentation. (bsc#895961)\n * Fix branding in error message. (bsc#902503)\n\nspacewalk-certs-tools:\n\n * Fix removal of existing host key entries. (bsc#886391)\n * Remove duplicates from authorized_keys2 as well. (bsc#885889)\n * Do not allow registering a SUSE Manager server against itself.\n (bsc#841731)\n\nspacewalk-client-tools:\n\n * Allow unicode characters in proxy username and password.\n * Send correct hostname. (bsc#887538)\n\nspacewalk-config:\n\n * Add recommended Apache settings from the Security Team.\n\nspacewalk-java:\n\n * Fix human dates now() staying unmodified. (bnc#880081)\n * Allow for null evr and archs on event history detail. (bnc#880327)\n * Disable form autocompletion in some places. (bnc#879998)\n * Fix datepicker time at xx:xx PM pre-filled with xx:xx AM.\n (bnc#881522)\n * Fixed package upgrade via SSM when using the Oracle DB as backend.\n (bnc#889721)\n * This update fixes various cross-site scripting (XSS) issues in\n spacewalk-java. (CVE-2014-3654, bnc#902182)\n * Sync correct repositories. (bnc#904959)\n * Fix pxt page link to point to the ported version of that page.\n (bsc#903720)\n * Correctly apply patches to multiple systems in SSM. (bsc#898242)\n * Fix CVE audit when some packages of a patch are already installed.\n (bsc#899266)\n * Download CSV button does not export all columns (\u0027Base Channel\u0027\n missing). (bsc#896238)\n * Read and display only a limited number of logfile lines. (bsc#883009)\n * Fix package upgrade via SSM. (bsc#889721)\n * Fix logrotate for /var/log/rhn/rhn_web_api.log. (bsc#884081)\n * Throw channel name exception if name is already used. (bnc#901675)\n * Don\u0027t commit when XMLRPCExceptions are thrown. (bsc#908320)\n * Remove \u0027Select All\u0027 button from system currency report. (bsc#653265)\n * Fix documentation search. (bsc#875452)\n * Add API listAutoinstallableChannels(). (bsc#887879)\n * Avoid ArrayIndexOutOfBoundsException with invalid URLs. (bsc#892711)\n * Avoid NumberFormatException in case of invalid URL. (bsc#892711)\n * Lookup kickstart tree only when org is found. (bsc#892711)\n * Fix NPE on GET /rhn/common/DownloadFile.do. (bsc#892711)\n * Port of the advanced provisioning option page to bootstrap.\n (bnc#862408)\n * mgr-sync refresh sets wrong permissions on JSON files. (bnc#907337)\n * Fix link to macro documentation. (bsc#895961)\n * Forward to \u0027raw mode\u0027 page in case this is an uploaded profile.\n (bsc#904841)\n * Enlarge big text area to use more available screen space.\n (bnc#867836)\n * Fix links to monitoring documentation. (bsc#906887)\n * Fix install type detection. (bsc#875231)\n * Point \u0027Register Clients\u0027 link to \u0027Client Configuration Guide\u0027.\n (bsc#880026)\n * Change order of installer type: prefer SUSE Linux. (bsc#860299)\n * Fix ISE when clicking system currency. (bnc#905530)\n * Set cobbler hostname variable when calling system.createSystemRecord.\n (bnc#904699)\n * Fix wrong install=http://nullnull line when calling\n system.createSystemRecord. (bnc#904699)\n * Explain snapshot/rollback behavior better. (bsc#808947)\n * Fix patch syncing: prevent hibernate.NonUniqueObjectException\n androllback. (bsc#903880)\n * Remove \u0027Add Selected to SSM\u0027 from system overview page. (bsc#901776)\n * Fix CVE audit in case of multi-version package installed and patch in\n multi channels. (bsc#903723)\n * Update channel family membership when channel is updated.\n (bsc#901193)\n * Add log warning if uploaded file size \u003e 1MB. (bnc#901927)\n * Fix channel package compare. (bsc#904690)\n * Fix automatic configuration file deployment via snippet. (bsc#898426)\n * Add client hostname or IP to log messages. (bsc#904732)\n * Fixed copying text from kickstart snippets. (bsc#880087)\n * Fix auditlog config yaml syntax. (bsc#913221)\n * Show Proxy tab if system is a proxy even when assigned to cloned\n channels. (bsc#913939)\n * Fixed uncaught error which prevent correct error handling.\n (bsc#858971)\n * Fix NPE by setting max_members to 0 instead of NULL. (bsc#912035)\n * Fix more cross-site-scripting (XSS) issues. (CVE-2014-7811,\n bsc#902915)\n * Fix basic authentication for HTTP proxies. (bsc#912057)\n * Accept repos with same SCC ID and different URLs. (bsc#911808)\n * Avoid mgr-sync-refresh failure because clear_log_id was not called.\n (bsc#911166)\n * Fix cross-site-scripting (XSS) issue in system-group (CVE-2014-7812,\n bsc#912886)\n * Fix \u0027Select All\u0027 buttons display on rhn:list and make it consistent\n with new rl:list. (bsc#909724)\n * Fix List tag missing submit parameter for \u0027Select All\u0027 and others.\n (bnc#909724)\n * Sort filelist in configfile.compare event history alphabetically.\n (bsc#910243)\n * Allow parenthesis in system group description. (bsc#903064)\n * Provide new API documentation in PDF format. (bsc#896029)\n * Update the example scripts section. (bsc#896029)\n * Fixed wording issues on package lock page. (bsc#880022)\n * Make text more clear for package profile sync. (bsc#884350)\n\nspacewalk-reports:\n\n * Added channel- and server-group-ids to activation-keys.\n * Added spacewalk-report for systems with extra packages.\n\nspacewalk-search:\n\n * Fix package searching in shared channels.\n\nspacewalk-setup:\n\n * Setup /etc/sudoers in SUSE Manager upgrade scripts (bnc#881711)\n * No activation if database population should be skipped. (bsc#900956)\n * Do not enable spacewalk-service in runlevel 4. (bsc#879992)\n\nspacewalk-utils:\n\n * Fixed spacewalk-hostname-rename to work with PostgreSQL backend.\n * Added limitation of spacewalk-clone-by-date for RHEL4 and earlier.\n * Add openSUSE 13.2 repositories to spacewalk-common-channels.\n * Improve clone-by-date dependency resolution.\n * Add CentOS 7 and EPEL 7 channels.\n * Fix error if blacklist / removelist is not in scbd configurationfile.\n\nspacewalk-web:\n\n * Fix links to monitoring documentation. (bsc#906887)\n * Show Proxy tab if system is a proxy even when assigned to cloned\n channels. (bsc#913939)\n\nsupportutils-plugin-susemanager:\n\n * Write current service and repository configuration into\n supportconfig.\n\nsusemanager-manuals_en, susemanager-jsp_en:\n\n * Clarification about supported Web browsers. (bsc#889905)\n * Update text and image files. (bnc#907527)\n * Document NCC to SCC switch with SUSE Manager 2.1. (bnc#907106,\n bnc#907643, bnc#907645, bnc#907646)\n * SUSE Manager server update description. (bnc#902373)\n * Activation keys and packages. (bnc#767279)\n * Cobbler (bnc#880027), Link fix (bnc#881225), Wagon (bnc#884366)\n * Install and ship the built PDFs. (bnc#907086)\n * Update text and image files (bsc#910494).\n * Firewall rules are incomplete - ssh-push and ssh-push-tunnel settings\n missing. (bsc#904703)\n * Document SP migration and ISS. (bsc#913215, partially).\n * Fix \u0027beta packages\u0027 mentioned in documentation. (bsc#886421).\n * User guide: Snapshots: clarify snaphot usage. (bsc#906851).\n * Document maximal supported configuration file limit. (bsc#910482).\n\nsusemanager-schema:\n\n * Add SLE 12 distribution targets to database.\n * Fix evr_t schema upgrade. (bsc#881111)\n * Allow evr_t to be compared with NULL in Oracle. (bsc#881111)\n * Add support to ppc64le architecture.\n * Fix migration script names to fix bare-metal registration.\n (bsc#896109)\n * Create regular index instead and have one migration per DB.\n (bsc#905072)\n * Drop unique index on package ids. (bsc#905072)\n * Fix NPE by setting max_members to 0 instead of NULL. (bsc#912035)\n * Fix old migration for future reference. (bsc#911180)\n * Avoid NPE when migrating to SCC on Oracle migrated from 1.7.\n (bsc#911180)\n\nsusemanager:\n\n * Update the sudoers file after SUSE Manager upgrade. (bnc#881711)\n * Fix oracle2postgres.sh (database configuration).\n * Replace /etc/motd after setup. (bsc#883379)\n * Make mgr-create-bootstrap-repo SCC and SLE 12 aware.\n * Abort setup when invalid SSL country code given. (bnc#882468)\n * Use noRepoSync parameter always.\n * Fixed error message on exception in mgr-sync. (bnc#905263)\n * Fixed add product to not trigger redundant addition of base channel.\n (bnc#901928)\n * Ask for the authentication beforehand. (bsc#908317)\n\nsusemanager-sync-data:\n\n * Add channels for Public Cloud Module. (bsc#907586)\n * Add new channel families SLE-WE and SLE-LP.\n * Add ATI and nVidia channels for SLED11-SP3. (bsc#901108)\n * Add channels for IBM-DLPAR for SLE12 ppc64le.\n * Added support for RES7 in SUSE Manager. (bsc#897723, bsc#893608)\n\nsuseRegisterInfo:\n\n * Re-add legacy suse_register_info to successfully perform the update.\n (bsc#898428)\n\nzypp-plugin-spacewalk:\n\n * Check for retrieveOnly option in up2date configuration and set\n download_only. (bsc#896254)\n * Changed the spec file to force usage of the official python VM.\n (bsc#889363)\n\nyum:\n\n * Preserve query parameters in URLs. (bsc#896844)\n\nstruts:\n\n * CVE-2014-0114: The ActionForm object in Apache Struts 1.x through\n 1.3.10 allows remote attackers to \u0027manipulate\u0027 the ClassLoader and\n execute arbitrary code via the class parameter, which is passed to\n the getClass method.\n\napache2-mod_wsgi:\n\n * CVE-2014-0242: Information exposure. (bnc#878553)\n * CVE-2014-0240: Local privilege escalation. (bnc#878550)\n * CVE-2014-8583: Failure to handle errors when attempting to drop group\n privileges. (bnc#903961)\n\nlibyaml-0-2:\n\n * Assert failure when processing wrapped strings (bnc#907809,\n CVE-2014-9130)\n\ntanukiwrapper:\n\n * Allow more than 4G as -Xmx option. (bsc#914900)\n\nThe following new packages have been added to the product: \nsusemanager-sync-data, google-gson, python-enum34.\n\nHow to apply this update:\n\n 1. Log in as root user to the SUSE Manager server.\n 2. Stop the Spacewalk service: spacewalk-service stop\n 3. Apply the patch using either zypper patch or YaST Online Update.\n 4. Upgrade the database schema with spacewalk-schema-upgrade\n 5. Start the Spacewalk service: spacewalk-service start\n\nSecurity Issues:\n\n * CVE-2014-0114\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0114\u003e\n * CVE-2014-0240\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0240\u003e\n * CVE-2014-0242\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0242\u003e\n * CVE-2014-3654\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3654\u003e\n * CVE-2014-7811\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7811\u003e\n * CVE-2014-7812\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7812\u003e\n * CVE-2014-8583\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8583\u003e\n * CVE-2014-9130\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9130\u003e\n\n", "title": "Description of the patch" }, { "category": "details", "text": "sleman21-suse-manager-201503", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-ru-2015_0611-1.json" }, { "category": "self", "summary": "URL for SUSE-RU-2015:0611-1", "url": "https://www.suse.com/support/update/announcement//suse-ru-20150611-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-RU-2015:0611-1", "url": "https://lists.suse.com/pipermail/sle-updates/2015-March/002829.html" }, { "category": "self", "summary": "SUSE Bug 653265", "url": "https://bugzilla.suse.com/653265" }, { "category": "self", "summary": "SUSE Bug 767279", "url": "https://bugzilla.suse.com/767279" }, { "category": "self", "summary": "SUSE Bug 808947", "url": "https://bugzilla.suse.com/808947" }, { "category": "self", "summary": "SUSE Bug 841731", "url": "https://bugzilla.suse.com/841731" }, { "category": "self", "summary": "SUSE Bug 855389", "url": "https://bugzilla.suse.com/855389" }, { "category": "self", "summary": "SUSE Bug 858971", "url": "https://bugzilla.suse.com/858971" }, { "category": "self", "summary": "SUSE Bug 860299", "url": "https://bugzilla.suse.com/860299" }, { "category": "self", "summary": "SUSE Bug 862408", "url": "https://bugzilla.suse.com/862408" }, { "category": "self", "summary": "SUSE Bug 867836", "url": "https://bugzilla.suse.com/867836" }, { "category": "self", "summary": "SUSE Bug 870159", "url": "https://bugzilla.suse.com/870159" }, { "category": "self", "summary": "SUSE Bug 872029", "url": "https://bugzilla.suse.com/872029" }, { "category": "self", "summary": "SUSE Bug 872298", "url": "https://bugzilla.suse.com/872298" }, { "category": "self", "summary": "SUSE Bug 872351", "url": "https://bugzilla.suse.com/872351" }, { "category": "self", "summary": "SUSE Bug 875231", "url": "https://bugzilla.suse.com/875231" }, { "category": "self", "summary": "SUSE Bug 875452", "url": "https://bugzilla.suse.com/875452" }, { "category": "self", "summary": "SUSE Bug 878550", "url": "https://bugzilla.suse.com/878550" }, { "category": "self", "summary": "SUSE Bug 878553", "url": "https://bugzilla.suse.com/878553" }, { "category": "self", "summary": "SUSE Bug 879904", "url": "https://bugzilla.suse.com/879904" }, { "category": "self", "summary": "SUSE Bug 879992", "url": "https://bugzilla.suse.com/879992" }, { "category": "self", "summary": "SUSE Bug 879998", "url": "https://bugzilla.suse.com/879998" }, { "category": "self", "summary": "SUSE Bug 880001", "url": "https://bugzilla.suse.com/880001" }, { "category": "self", "summary": "SUSE Bug 880022", "url": "https://bugzilla.suse.com/880022" }, { "category": "self", "summary": "SUSE Bug 880026", "url": "https://bugzilla.suse.com/880026" }, { "category": "self", "summary": "SUSE Bug 880027", "url": "https://bugzilla.suse.com/880027" }, { "category": "self", "summary": "SUSE Bug 880081", "url": "https://bugzilla.suse.com/880081" }, { "category": "self", "summary": "SUSE Bug 880087", "url": "https://bugzilla.suse.com/880087" }, { "category": "self", "summary": "SUSE Bug 880327", "url": "https://bugzilla.suse.com/880327" }, { "category": "self", "summary": "SUSE Bug 880388", "url": "https://bugzilla.suse.com/880388" }, { "category": "self", "summary": "SUSE Bug 880936", "url": "https://bugzilla.suse.com/880936" }, { "category": "self", "summary": "SUSE Bug 881111", "url": "https://bugzilla.suse.com/881111" }, { "category": "self", "summary": "SUSE Bug 881225", "url": "https://bugzilla.suse.com/881225" }, { "category": "self", "summary": "SUSE Bug 881522", "url": "https://bugzilla.suse.com/881522" }, { "category": "self", "summary": "SUSE Bug 881711", "url": "https://bugzilla.suse.com/881711" }, { "category": "self", "summary": "SUSE Bug 882468", "url": "https://bugzilla.suse.com/882468" }, { "category": "self", "summary": "SUSE Bug 883009", "url": "https://bugzilla.suse.com/883009" }, { "category": "self", "summary": "SUSE Bug 883057", "url": "https://bugzilla.suse.com/883057" }, { "category": "self", "summary": "SUSE Bug 883379", "url": "https://bugzilla.suse.com/883379" }, { "category": "self", "summary": "SUSE Bug 883487", "url": "https://bugzilla.suse.com/883487" }, { "category": "self", "summary": "SUSE Bug 884051", "url": "https://bugzilla.suse.com/884051" }, { "category": "self", "summary": "SUSE Bug 884081", "url": "https://bugzilla.suse.com/884081" }, { "category": "self", "summary": "SUSE Bug 884350", "url": "https://bugzilla.suse.com/884350" }, { "category": "self", "summary": "SUSE Bug 884366", "url": "https://bugzilla.suse.com/884366" }, { "category": "self", "summary": "SUSE Bug 885889", "url": "https://bugzilla.suse.com/885889" }, { "category": "self", "summary": "SUSE Bug 886391", "url": "https://bugzilla.suse.com/886391" }, { "category": "self", "summary": "SUSE Bug 886421", "url": "https://bugzilla.suse.com/886421" }, { "category": "self", "summary": "SUSE Bug 887538", "url": "https://bugzilla.suse.com/887538" }, { "category": "self", "summary": "SUSE Bug 887879", "url": "https://bugzilla.suse.com/887879" }, { "category": "self", "summary": "SUSE Bug 889363", "url": "https://bugzilla.suse.com/889363" }, { "category": "self", "summary": "SUSE Bug 889605", "url": "https://bugzilla.suse.com/889605" }, { "category": "self", "summary": "SUSE Bug 889721", "url": "https://bugzilla.suse.com/889721" }, { "category": "self", "summary": "SUSE Bug 889739", "url": "https://bugzilla.suse.com/889739" }, { "category": "self", "summary": "SUSE Bug 889905", "url": "https://bugzilla.suse.com/889905" }, { "category": "self", "summary": "SUSE Bug 892707", "url": "https://bugzilla.suse.com/892707" }, { "category": "self", "summary": "SUSE Bug 892711", "url": "https://bugzilla.suse.com/892711" }, { "category": "self", "summary": "SUSE Bug 893608", "url": "https://bugzilla.suse.com/893608" }, { "category": "self", "summary": "SUSE Bug 895001", "url": "https://bugzilla.suse.com/895001" }, { "category": "self", "summary": "SUSE Bug 895961", "url": "https://bugzilla.suse.com/895961" }, { "category": "self", "summary": "SUSE Bug 896029", "url": "https://bugzilla.suse.com/896029" }, { "category": "self", "summary": "SUSE Bug 896109", "url": "https://bugzilla.suse.com/896109" }, { "category": "self", "summary": "SUSE Bug 896238", "url": "https://bugzilla.suse.com/896238" }, { "category": "self", "summary": "SUSE Bug 896244", "url": "https://bugzilla.suse.com/896244" }, { "category": "self", "summary": "SUSE Bug 896254", "url": "https://bugzilla.suse.com/896254" }, { "category": "self", "summary": "SUSE Bug 896844", "url": "https://bugzilla.suse.com/896844" }, { "category": "self", "summary": "SUSE Bug 897723", "url": "https://bugzilla.suse.com/897723" }, { "category": "self", "summary": "SUSE Bug 898242", "url": "https://bugzilla.suse.com/898242" }, { "category": "self", "summary": "SUSE Bug 898426", "url": "https://bugzilla.suse.com/898426" }, { "category": "self", "summary": "SUSE Bug 898428", "url": "https://bugzilla.suse.com/898428" }, { "category": "self", "summary": "SUSE Bug 899266", "url": "https://bugzilla.suse.com/899266" }, { "category": "self", "summary": "SUSE Bug 900956", "url": "https://bugzilla.suse.com/900956" }, { "category": "self", "summary": "SUSE Bug 901058", "url": "https://bugzilla.suse.com/901058" }, { "category": "self", "summary": "SUSE Bug 901108", "url": "https://bugzilla.suse.com/901108" }, { "category": "self", "summary": "SUSE Bug 901193", "url": "https://bugzilla.suse.com/901193" }, { "category": "self", "summary": "SUSE Bug 901675", "url": "https://bugzilla.suse.com/901675" }, { "category": "self", "summary": "SUSE Bug 901776", "url": "https://bugzilla.suse.com/901776" }, { "category": "self", "summary": "SUSE Bug 901927", "url": "https://bugzilla.suse.com/901927" }, { "category": "self", "summary": "SUSE Bug 901928", "url": "https://bugzilla.suse.com/901928" }, { "category": "self", "summary": "SUSE Bug 901958", "url": "https://bugzilla.suse.com/901958" }, { "category": "self", "summary": "SUSE Bug 902182", "url": "https://bugzilla.suse.com/902182" }, { "category": "self", "summary": "SUSE Bug 902373", "url": "https://bugzilla.suse.com/902373" }, { "category": "self", "summary": "SUSE Bug 902494", "url": "https://bugzilla.suse.com/902494" }, { "category": "self", "summary": "SUSE Bug 902503", "url": "https://bugzilla.suse.com/902503" }, { "category": "self", "summary": "SUSE Bug 902915", "url": "https://bugzilla.suse.com/902915" }, { "category": "self", "summary": "SUSE Bug 903064", "url": "https://bugzilla.suse.com/903064" }, { "category": "self", "summary": "SUSE Bug 903720", "url": "https://bugzilla.suse.com/903720" }, { "category": "self", "summary": "SUSE Bug 903723", "url": "https://bugzilla.suse.com/903723" }, { "category": "self", "summary": "SUSE Bug 903880", "url": "https://bugzilla.suse.com/903880" }, { "category": "self", "summary": "SUSE Bug 903961", "url": "https://bugzilla.suse.com/903961" }, { "category": "self", "summary": "SUSE Bug 904690", "url": "https://bugzilla.suse.com/904690" }, { "category": "self", "summary": "SUSE Bug 904699", "url": "https://bugzilla.suse.com/904699" }, { "category": "self", "summary": "SUSE Bug 904703", "url": "https://bugzilla.suse.com/904703" }, { "category": "self", "summary": "SUSE Bug 904732", "url": "https://bugzilla.suse.com/904732" }, { "category": "self", "summary": "SUSE Bug 904841", "url": "https://bugzilla.suse.com/904841" }, { "category": "self", "summary": "SUSE Bug 904959", "url": "https://bugzilla.suse.com/904959" }, { "category": "self", "summary": "SUSE Bug 905072", "url": "https://bugzilla.suse.com/905072" }, { "category": "self", "summary": "SUSE Bug 905263", "url": "https://bugzilla.suse.com/905263" }, { "category": "self", "summary": "SUSE Bug 905530", "url": "https://bugzilla.suse.com/905530" }, { "category": "self", "summary": "SUSE Bug 906850", "url": "https://bugzilla.suse.com/906850" }, { "category": "self", "summary": "SUSE Bug 906851", "url": "https://bugzilla.suse.com/906851" }, { "category": "self", "summary": "SUSE Bug 906887", "url": "https://bugzilla.suse.com/906887" }, { "category": "self", "summary": "SUSE Bug 907086", "url": "https://bugzilla.suse.com/907086" }, { "category": "self", "summary": "SUSE Bug 907106", "url": "https://bugzilla.suse.com/907106" }, { "category": "self", "summary": "SUSE Bug 907337", "url": "https://bugzilla.suse.com/907337" }, { "category": "self", "summary": "SUSE Bug 907527", "url": "https://bugzilla.suse.com/907527" }, { "category": "self", "summary": "SUSE Bug 907586", "url": "https://bugzilla.suse.com/907586" }, { "category": "self", "summary": "SUSE Bug 907643", "url": "https://bugzilla.suse.com/907643" }, { "category": "self", "summary": "SUSE Bug 907645", "url": "https://bugzilla.suse.com/907645" }, { "category": "self", "summary": "SUSE Bug 907646", "url": "https://bugzilla.suse.com/907646" }, { "category": "self", "summary": "SUSE Bug 907677", "url": "https://bugzilla.suse.com/907677" }, { "category": "self", "summary": "SUSE Bug 907809", "url": "https://bugzilla.suse.com/907809" }, { "category": "self", "summary": "SUSE Bug 908317", "url": "https://bugzilla.suse.com/908317" }, { "category": "self", "summary": "SUSE Bug 908320", "url": "https://bugzilla.suse.com/908320" }, { "category": "self", "summary": "SUSE Bug 908849", "url": "https://bugzilla.suse.com/908849" }, { "category": "self", "summary": "SUSE Bug 909724", "url": "https://bugzilla.suse.com/909724" }, { "category": "self", "summary": "SUSE Bug 910243", "url": "https://bugzilla.suse.com/910243" }, { "category": "self", "summary": "SUSE Bug 910482", "url": "https://bugzilla.suse.com/910482" }, { "category": "self", "summary": "SUSE Bug 910494", "url": "https://bugzilla.suse.com/910494" }, { "category": "self", "summary": "SUSE Bug 911166", "url": "https://bugzilla.suse.com/911166" }, { "category": "self", "summary": "SUSE Bug 911180", "url": "https://bugzilla.suse.com/911180" }, { "category": "self", "summary": "SUSE Bug 911272", "url": "https://bugzilla.suse.com/911272" }, { "category": "self", "summary": "SUSE Bug 911808", "url": "https://bugzilla.suse.com/911808" }, { "category": "self", "summary": "SUSE Bug 912035", "url": "https://bugzilla.suse.com/912035" }, { "category": "self", "summary": "SUSE Bug 912057", "url": "https://bugzilla.suse.com/912057" }, { "category": "self", "summary": "SUSE Bug 912886", "url": "https://bugzilla.suse.com/912886" }, { "category": "self", "summary": "SUSE Bug 913215", "url": "https://bugzilla.suse.com/913215" }, { "category": "self", "summary": "SUSE Bug 913221", "url": "https://bugzilla.suse.com/913221" }, { "category": "self", "summary": "SUSE Bug 913939", "url": "https://bugzilla.suse.com/913939" }, { "category": "self", "summary": "SUSE Bug 914260", "url": "https://bugzilla.suse.com/914260" }, { "category": "self", "summary": "SUSE Bug 914437", "url": "https://bugzilla.suse.com/914437" }, { "category": "self", "summary": "SUSE Bug 914900", "url": "https://bugzilla.suse.com/914900" }, { "category": "self", "summary": "SUSE Bug 915140", "url": "https://bugzilla.suse.com/915140" }, { "category": "self", "summary": "SUSE Bug 919448", "url": "https://bugzilla.suse.com/919448" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0114 page", "url": "https://www.suse.com/security/cve/CVE-2014-0114/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0240 page", "url": "https://www.suse.com/security/cve/CVE-2014-0240/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0242 page", "url": "https://www.suse.com/security/cve/CVE-2014-0242/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-3654 page", "url": "https://www.suse.com/security/cve/CVE-2014-3654/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-7811 page", "url": "https://www.suse.com/security/cve/CVE-2014-7811/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-7812 page", "url": "https://www.suse.com/security/cve/CVE-2014-7812/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-8583 page", "url": "https://www.suse.com/security/cve/CVE-2014-8583/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9130 page", "url": "https://www.suse.com/security/cve/CVE-2014-9130/" } ], "title": "Recommended update for SUSE Manager Server 2.1", "tracking": { "current_release_date": "2015-02-25T20:05:05Z", "generator": { "date": "2015-02-25T20:05:05Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-RU-2015:0611-1", "initial_release_date": "2015-02-25T20:05:05Z", "revision_history": [ { "date": "2015-02-25T20:05:05Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "auditlog-keeper-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "product": { "name": "auditlog-keeper-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "product_id": "auditlog-keeper-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch" } }, { "category": "product_version", "name": "auditlog-keeper-rdbms-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "product": { "name": "auditlog-keeper-rdbms-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "product_id": "auditlog-keeper-rdbms-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch" } }, { "category": "product_version", "name": "auditlog-keeper-spacewalk-validator-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "product": { "name": "auditlog-keeper-spacewalk-validator-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "product_id": "auditlog-keeper-spacewalk-validator-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch" } }, { "category": "product_version", "name": "auditlog-keeper-syslog-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "product": { "name": "auditlog-keeper-syslog-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "product_id": "auditlog-keeper-syslog-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch" } }, { "category": "product_version", "name": "auditlog-keeper-xmlout-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "product": { "name": "auditlog-keeper-xmlout-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "product_id": "auditlog-keeper-xmlout-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch" } }, { "category": "product_version", "name": "google-gson-2.2.4-0.7.52.noarch", "product": { "name": "google-gson-2.2.4-0.7.52.noarch", "product_id": "google-gson-2.2.4-0.7.52.noarch" } }, { "category": "product_version", "name": "oracle-config-1.1-0.10.10.16.noarch", "product": { "name": "oracle-config-1.1-0.10.10.16.noarch", "product_id": "oracle-config-1.1-0.10.10.16.noarch" } }, { "category": "product_version", "name": "osa-dispatcher-5.11.33.7-0.7.16.noarch", "product": { "name": "osa-dispatcher-5.11.33.7-0.7.16.noarch", "product_id": "osa-dispatcher-5.11.33.7-0.7.16.noarch" } }, { "category": "product_version", "name": "perl-Class-Singleton-1.4-4.13.38.noarch", "product": { "name": "perl-Class-Singleton-1.4-4.13.38.noarch", "product_id": "perl-Class-Singleton-1.4-4.13.38.noarch" } }, { "category": "product_version", "name": "perl-NOCpulse-Object-1.26.13.2-0.7.13.noarch", "product": { "name": "perl-NOCpulse-Object-1.26.13.2-0.7.13.noarch", "product_id": "perl-NOCpulse-Object-1.26.13.2-0.7.13.noarch" } }, { "category": "product_version", "name": "perl-Satcon-1.20.2-0.7.6.noarch", "product": { "name": "perl-Satcon-1.20.2-0.7.6.noarch", "product_id": "perl-Satcon-1.20.2-0.7.6.noarch" } }, { "category": "product_version", "name": "perl-auditlog-keeper-client-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "product": { "name": "perl-auditlog-keeper-client-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "product_id": "perl-auditlog-keeper-client-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch" } }, { "category": "product_version", "name": "pxe-default-image-0.1-0.20.56.noarch", "product": { "name": "pxe-default-image-0.1-0.20.56.noarch", "product_id": "pxe-default-image-0.1-0.20.56.noarch" } }, { "category": "product_version", "name": "rhn-custom-info-5.4.22.6-0.7.13.noarch", "product": { "name": "rhn-custom-info-5.4.22.6-0.7.13.noarch", "product_id": "rhn-custom-info-5.4.22.6-0.7.13.noarch" } }, { "category": "product_version", "name": "rhnmd-5.3.18.4-0.7.15.noarch", "product": { "name": "rhnmd-5.3.18.4-0.7.15.noarch", "product_id": "rhnmd-5.3.18.4-0.7.15.noarch" } }, { "category": "product_version", "name": "rhnpush-5.5.71.7-0.7.16.noarch", "product": { "name": "rhnpush-5.5.71.7-0.7.16.noarch", "product_id": "rhnpush-5.5.71.7-0.7.16.noarch" } }, { "category": "product_version", "name": "sm-ncc-sync-data-2.1.9-0.7.6.noarch", "product": { "name": "sm-ncc-sync-data-2.1.9-0.7.6.noarch", "product_id": "sm-ncc-sync-data-2.1.9-0.7.6.noarch" } }, { "category": "product_version", "name": "spacewalk-admin-2.1.2.4-0.7.6.noarch", "product": { "name": "spacewalk-admin-2.1.2.4-0.7.6.noarch", "product_id": "spacewalk-admin-2.1.2.4-0.7.6.noarch" } }, { "category": "product_version", "name": "spacewalk-base-2.1.60.12-0.7.7.noarch", "product": { "name": "spacewalk-base-2.1.60.12-0.7.7.noarch", "product_id": "spacewalk-base-2.1.60.12-0.7.7.noarch" } }, { "category": "product_version", "name": "spacewalk-base-minimal-2.1.60.12-0.7.7.noarch", "product": { "name": "spacewalk-base-minimal-2.1.60.12-0.7.7.noarch", "product_id": "spacewalk-base-minimal-2.1.60.12-0.7.7.noarch" } }, { "category": "product_version", "name": "spacewalk-base-minimal-config-2.1.60.12-0.7.7.noarch", "product": { "name": "spacewalk-base-minimal-config-2.1.60.12-0.7.7.noarch", "product_id": "spacewalk-base-minimal-config-2.1.60.12-0.7.7.noarch" } }, { "category": "product_version", "name": "spacewalk-certs-tools-2.1.6.5-0.7.10.noarch", "product": { "name": "spacewalk-certs-tools-2.1.6.5-0.7.10.noarch", "product_id": "spacewalk-certs-tools-2.1.6.5-0.7.10.noarch" } }, { "category": "product_version", "name": "spacewalk-check-2.1.16.6-0.7.9.noarch", "product": { "name": "spacewalk-check-2.1.16.6-0.7.9.noarch", "product_id": "spacewalk-check-2.1.16.6-0.7.9.noarch" } }, { "category": "product_version", "name": "spacewalk-client-setup-2.1.16.6-0.7.9.noarch", "product": { "name": "spacewalk-client-setup-2.1.16.6-0.7.9.noarch", "product_id": "spacewalk-client-setup-2.1.16.6-0.7.9.noarch" } }, { "category": "product_version", "name": "spacewalk-client-tools-2.1.16.6-0.7.9.noarch", "product": { "name": "spacewalk-client-tools-2.1.16.6-0.7.9.noarch", "product_id": "spacewalk-client-tools-2.1.16.6-0.7.9.noarch" } }, { "category": "product_version", "name": "spacewalk-config-2.1.5.4-0.7.15.noarch", "product": { "name": "spacewalk-config-2.1.5.4-0.7.15.noarch", "product_id": "spacewalk-config-2.1.5.4-0.7.15.noarch" } }, { "category": "product_version", "name": "spacewalk-doc-indexes-2.1.2.3-0.7.26.noarch", "product": { "name": "spacewalk-doc-indexes-2.1.2.3-0.7.26.noarch", "product_id": "spacewalk-doc-indexes-2.1.2.3-0.7.26.noarch" } }, { "category": "product_version", "name": "spacewalk-grail-2.1.60.12-0.7.7.noarch", "product": { "name": "spacewalk-grail-2.1.60.12-0.7.7.noarch", "product_id": "spacewalk-grail-2.1.60.12-0.7.7.noarch" } }, { "category": "product_version", "name": "spacewalk-html-2.1.60.12-0.7.7.noarch", "product": { "name": "spacewalk-html-2.1.60.12-0.7.7.noarch", "product_id": "spacewalk-html-2.1.60.12-0.7.7.noarch" } }, { "category": "product_version", "name": "spacewalk-java-2.1.165.14-0.7.16.noarch", "product": { "name": "spacewalk-java-2.1.165.14-0.7.16.noarch", "product_id": "spacewalk-java-2.1.165.14-0.7.16.noarch" } }, { "category": "product_version", "name": "spacewalk-java-config-2.1.165.14-0.7.16.noarch", "product": { "name": "spacewalk-java-config-2.1.165.14-0.7.16.noarch", "product_id": "spacewalk-java-config-2.1.165.14-0.7.16.noarch" } }, { "category": "product_version", "name": "spacewalk-java-lib-2.1.165.14-0.7.16.noarch", "product": { "name": "spacewalk-java-lib-2.1.165.14-0.7.16.noarch", "product_id": "spacewalk-java-lib-2.1.165.14-0.7.16.noarch" } }, { "category": "product_version", "name": "spacewalk-java-oracle-2.1.165.14-0.7.16.noarch", "product": { "name": "spacewalk-java-oracle-2.1.165.14-0.7.16.noarch", "product_id": "spacewalk-java-oracle-2.1.165.14-0.7.16.noarch" } }, { "category": "product_version", "name": "spacewalk-java-postgresql-2.1.165.14-0.7.16.noarch", "product": { "name": "spacewalk-java-postgresql-2.1.165.14-0.7.16.noarch", "product_id": "spacewalk-java-postgresql-2.1.165.14-0.7.16.noarch" } }, { "category": "product_version", "name": "spacewalk-pxt-2.1.60.12-0.7.7.noarch", "product": { "name": "spacewalk-pxt-2.1.60.12-0.7.7.noarch", "product_id": "spacewalk-pxt-2.1.60.12-0.7.7.noarch" } }, { "category": "product_version", "name": "spacewalk-reports-2.1.14.8-0.7.10.noarch", "product": { "name": "spacewalk-reports-2.1.14.8-0.7.10.noarch", "product_id": "spacewalk-reports-2.1.14.8-0.7.10.noarch" } }, { "category": "product_version", "name": "spacewalk-search-2.1.14.6-0.7.18.noarch", "product": { "name": "spacewalk-search-2.1.14.6-0.7.18.noarch", "product_id": "spacewalk-search-2.1.14.6-0.7.18.noarch" } }, { "category": "product_version", "name": "spacewalk-setup-2.1.14.9-0.7.6.noarch", "product": { "name": "spacewalk-setup-2.1.14.9-0.7.6.noarch", "product_id": "spacewalk-setup-2.1.14.9-0.7.6.noarch" } }, { "category": "product_version", "name": "spacewalk-setup-jabberd-2.1.0.2-0.7.6.noarch", "product": { "name": "spacewalk-setup-jabberd-2.1.0.2-0.7.6.noarch", "product_id": "spacewalk-setup-jabberd-2.1.0.2-0.7.6.noarch" } }, { "category": "product_version", "name": "spacewalk-sniglets-2.1.60.12-0.7.7.noarch", "product": { "name": "spacewalk-sniglets-2.1.60.12-0.7.7.noarch", "product_id": "spacewalk-sniglets-2.1.60.12-0.7.7.noarch" } }, { "category": "product_version", "name": "spacewalk-taskomatic-2.1.165.14-0.7.16.noarch", "product": { "name": "spacewalk-taskomatic-2.1.165.14-0.7.16.noarch", "product_id": "spacewalk-taskomatic-2.1.165.14-0.7.16.noarch" } }, { "category": "product_version", "name": "spacewalk-utils-2.1.27.12-0.7.25.noarch", "product": { "name": "spacewalk-utils-2.1.27.12-0.7.25.noarch", "product_id": "spacewalk-utils-2.1.27.12-0.7.25.noarch" } }, { "category": "product_version", "name": "struts-1.2.9-162.33.22.noarch", "product": { "name": "struts-1.2.9-162.33.22.noarch", "product_id": "struts-1.2.9-162.33.22.noarch" } }, { "category": "product_version", "name": "supportutils-plugin-susemanager-1.0.3-0.5.5.noarch", "product": { "name": "supportutils-plugin-susemanager-1.0.3-0.5.5.noarch", "product_id": "supportutils-plugin-susemanager-1.0.3-0.5.5.noarch" } }, { "category": "product_version", "name": "supportutils-plugin-susemanager-client-1.0.4-0.5.5.noarch", "product": { "name": "supportutils-plugin-susemanager-client-1.0.4-0.5.5.noarch", "product_id": "supportutils-plugin-susemanager-client-1.0.4-0.5.5.noarch" } }, { "category": "product_version", "name": "susemanager-client-config_en-pdf-2.1-0.15.24.noarch", "product": { "name": "susemanager-client-config_en-pdf-2.1-0.15.24.noarch", "product_id": "susemanager-client-config_en-pdf-2.1-0.15.24.noarch" } }, { "category": "product_version", "name": "susemanager-install_en-pdf-2.1-0.15.24.noarch", "product": { "name": "susemanager-install_en-pdf-2.1-0.15.24.noarch", "product_id": "susemanager-install_en-pdf-2.1-0.15.24.noarch" } }, { "category": "product_version", "name": "susemanager-jsp_en-2.1-0.15.23.noarch", "product": { "name": "susemanager-jsp_en-2.1-0.15.23.noarch", "product_id": "susemanager-jsp_en-2.1-0.15.23.noarch" } }, { "category": "product_version", "name": "susemanager-manuals_en-2.1-0.15.24.noarch", "product": { "name": "susemanager-manuals_en-2.1-0.15.24.noarch", "product_id": "susemanager-manuals_en-2.1-0.15.24.noarch" } }, { "category": "product_version", "name": "susemanager-proxy-quick_en-pdf-2.1-0.15.24.noarch", "product": { "name": "susemanager-proxy-quick_en-pdf-2.1-0.15.24.noarch", "product_id": "susemanager-proxy-quick_en-pdf-2.1-0.15.24.noarch" } }, { "category": "product_version", "name": "susemanager-reference_en-pdf-2.1-0.15.24.noarch", "product": { "name": "susemanager-reference_en-pdf-2.1-0.15.24.noarch", "product_id": "susemanager-reference_en-pdf-2.1-0.15.24.noarch" } }, { "category": "product_version", "name": "susemanager-schema-2.1.50.11-0.7.8.noarch", "product": { "name": "susemanager-schema-2.1.50.11-0.7.8.noarch", "product_id": "susemanager-schema-2.1.50.11-0.7.8.noarch" } }, { "category": "product_version", "name": "susemanager-sync-data-2.1.5-0.7.6.noarch", "product": { "name": "susemanager-sync-data-2.1.5-0.7.6.noarch", "product_id": "susemanager-sync-data-2.1.5-0.7.6.noarch" } }, { "category": "product_version", "name": "susemanager-user_en-pdf-2.1-0.15.24.noarch", "product": { "name": "susemanager-user_en-pdf-2.1-0.15.24.noarch", "product_id": "susemanager-user_en-pdf-2.1-0.15.24.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "apache2-mod_wsgi-3.3-5.7.17.s390x", "product": { "name": "apache2-mod_wsgi-3.3-5.7.17.s390x", "product_id": "apache2-mod_wsgi-3.3-5.7.17.s390x" } }, { "category": "product_version", "name": "cobbler-2.2.2-0.54.9.s390x", "product": { "name": "cobbler-2.2.2-0.54.9.s390x", "product_id": "cobbler-2.2.2-0.54.9.s390x" } }, { "category": "product_version", "name": "libyaml-0-2-0.1.3-0.10.16.11.s390x", "product": { "name": "libyaml-0-2-0.1.3-0.10.16.11.s390x", "product_id": "libyaml-0-2-0.1.3-0.10.16.11.s390x" } }, { "category": "product_version", "name": "postgresql91-pltcl-9.1.15-0.3.1.s390x", "product": { "name": "postgresql91-pltcl-9.1.15-0.3.1.s390x", "product_id": "postgresql91-pltcl-9.1.15-0.3.1.s390x" } }, { "category": "product_version", "name": "python-enum34-1.0-0.7.33.s390x", "product": { "name": "python-enum34-1.0-0.7.33.s390x", "product_id": "python-enum34-1.0-0.7.33.s390x" } }, { "category": "product_version", "name": "python-gzipstream-1.10.2.2-0.7.6.s390x", "product": { "name": "python-gzipstream-1.10.2.2-0.7.6.s390x", "product_id": "python-gzipstream-1.10.2.2-0.7.6.s390x" } }, { "category": "product_version", "name": "rhnlib-2.5.69.6-0.7.6.s390x", "product": { "name": "rhnlib-2.5.69.6-0.7.6.s390x", "product_id": "rhnlib-2.5.69.6-0.7.6.s390x" } }, { "category": "product_version", "name": "smdba-1.5.1-0.7.6.s390x", "product": { "name": "smdba-1.5.1-0.7.6.s390x", "product_id": "smdba-1.5.1-0.7.6.s390x" } }, { "category": "product_version", "name": "spacecmd-2.1.25.7-0.7.9.s390x", "product": { "name": "spacecmd-2.1.25.7-0.7.9.s390x", "product_id": "spacecmd-2.1.25.7-0.7.9.s390x" } }, { "category": "product_version", "name": "spacewalk-backend-2.1.55.15-0.7.11.s390x", "product": { "name": "spacewalk-backend-2.1.55.15-0.7.11.s390x", "product_id": "spacewalk-backend-2.1.55.15-0.7.11.s390x" } }, { "category": "product_version", "name": "spacewalk-backend-app-2.1.55.15-0.7.11.s390x", "product": { "name": "spacewalk-backend-app-2.1.55.15-0.7.11.s390x", "product_id": "spacewalk-backend-app-2.1.55.15-0.7.11.s390x" } }, { "category": "product_version", "name": "spacewalk-backend-applet-2.1.55.15-0.7.11.s390x", "product": { "name": "spacewalk-backend-applet-2.1.55.15-0.7.11.s390x", "product_id": "spacewalk-backend-applet-2.1.55.15-0.7.11.s390x" } }, { "category": "product_version", "name": "spacewalk-backend-config-files-2.1.55.15-0.7.11.s390x", "product": { "name": "spacewalk-backend-config-files-2.1.55.15-0.7.11.s390x", "product_id": "spacewalk-backend-config-files-2.1.55.15-0.7.11.s390x" } }, { "category": "product_version", "name": "spacewalk-backend-config-files-common-2.1.55.15-0.7.11.s390x", "product": { "name": "spacewalk-backend-config-files-common-2.1.55.15-0.7.11.s390x", "product_id": "spacewalk-backend-config-files-common-2.1.55.15-0.7.11.s390x" } }, { "category": "product_version", "name": "spacewalk-backend-config-files-tool-2.1.55.15-0.7.11.s390x", "product": { "name": "spacewalk-backend-config-files-tool-2.1.55.15-0.7.11.s390x", "product_id": "spacewalk-backend-config-files-tool-2.1.55.15-0.7.11.s390x" } }, { "category": "product_version", "name": "spacewalk-backend-iss-2.1.55.15-0.7.11.s390x", "product": { "name": "spacewalk-backend-iss-2.1.55.15-0.7.11.s390x", "product_id": "spacewalk-backend-iss-2.1.55.15-0.7.11.s390x" } }, { "category": "product_version", "name": "spacewalk-backend-iss-export-2.1.55.15-0.7.11.s390x", "product": { "name": "spacewalk-backend-iss-export-2.1.55.15-0.7.11.s390x", "product_id": "spacewalk-backend-iss-export-2.1.55.15-0.7.11.s390x" } }, { "category": "product_version", "name": "spacewalk-backend-libs-2.1.55.15-0.7.11.s390x", "product": { "name": "spacewalk-backend-libs-2.1.55.15-0.7.11.s390x", "product_id": "spacewalk-backend-libs-2.1.55.15-0.7.11.s390x" } }, { "category": "product_version", "name": "spacewalk-backend-package-push-server-2.1.55.15-0.7.11.s390x", "product": { "name": "spacewalk-backend-package-push-server-2.1.55.15-0.7.11.s390x", "product_id": "spacewalk-backend-package-push-server-2.1.55.15-0.7.11.s390x" } }, { "category": "product_version", "name": "spacewalk-backend-server-2.1.55.15-0.7.11.s390x", "product": { "name": "spacewalk-backend-server-2.1.55.15-0.7.11.s390x", "product_id": "spacewalk-backend-server-2.1.55.15-0.7.11.s390x" } }, { "category": "product_version", "name": "spacewalk-backend-sql-2.1.55.15-0.7.11.s390x", "product": { "name": "spacewalk-backend-sql-2.1.55.15-0.7.11.s390x", "product_id": "spacewalk-backend-sql-2.1.55.15-0.7.11.s390x" } }, { "category": "product_version", "name": "spacewalk-backend-sql-oracle-2.1.55.15-0.7.11.s390x", "product": { "name": "spacewalk-backend-sql-oracle-2.1.55.15-0.7.11.s390x", "product_id": "spacewalk-backend-sql-oracle-2.1.55.15-0.7.11.s390x" } }, { "category": "product_version", "name": "spacewalk-backend-sql-postgresql-2.1.55.15-0.7.11.s390x", "product": { "name": "spacewalk-backend-sql-postgresql-2.1.55.15-0.7.11.s390x", "product_id": "spacewalk-backend-sql-postgresql-2.1.55.15-0.7.11.s390x" } }, { "category": "product_version", "name": "spacewalk-backend-tools-2.1.55.15-0.7.11.s390x", "product": { "name": "spacewalk-backend-tools-2.1.55.15-0.7.11.s390x", "product_id": "spacewalk-backend-tools-2.1.55.15-0.7.11.s390x" } }, { "category": "product_version", "name": "spacewalk-backend-xml-export-libs-2.1.55.15-0.7.11.s390x", "product": { "name": "spacewalk-backend-xml-export-libs-2.1.55.15-0.7.11.s390x", "product_id": "spacewalk-backend-xml-export-libs-2.1.55.15-0.7.11.s390x" } }, { "category": "product_version", "name": "spacewalk-backend-xmlrpc-2.1.55.15-0.7.11.s390x", "product": { "name": "spacewalk-backend-xmlrpc-2.1.55.15-0.7.11.s390x", "product_id": "spacewalk-backend-xmlrpc-2.1.55.15-0.7.11.s390x" } }, { "category": "product_version", "name": "spacewalk-branding-2.1.33.10-0.7.16.s390x", "product": { "name": "spacewalk-branding-2.1.33.10-0.7.16.s390x", "product_id": "spacewalk-branding-2.1.33.10-0.7.16.s390x" } }, { "category": "product_version", "name": "spacewalksd-5.0.14.6-0.7.15.s390x", "product": { "name": "spacewalksd-5.0.14.6-0.7.15.s390x", "product_id": "spacewalksd-5.0.14.6-0.7.15.s390x" } }, { "category": "product_version", "name": "suseRegisterInfo-2.1.9-0.7.29.s390x", "product": { "name": "suseRegisterInfo-2.1.9-0.7.29.s390x", "product_id": "suseRegisterInfo-2.1.9-0.7.29.s390x" } }, { "category": "product_version", "name": "susemanager-2.1.17-0.7.11.s390x", "product": { "name": "susemanager-2.1.17-0.7.11.s390x", "product_id": "susemanager-2.1.17-0.7.11.s390x" } }, { "category": "product_version", "name": "susemanager-tools-2.1.17-0.7.11.s390x", "product": { "name": "susemanager-tools-2.1.17-0.7.11.s390x", "product_id": "susemanager-tools-2.1.17-0.7.11.s390x" } }, { "category": "product_version", "name": "tanukiwrapper-3.2.3-0.10.12.s390x", "product": { "name": "tanukiwrapper-3.2.3-0.10.12.s390x", "product_id": "tanukiwrapper-3.2.3-0.10.12.s390x" } }, { "category": "product_version", "name": "yum-3.2.29-0.19.30.s390x", "product": { "name": "yum-3.2.29-0.19.30.s390x", "product_id": "yum-3.2.29-0.19.30.s390x" } }, { "category": "product_version", "name": "yum-common-3.2.29-0.19.30.s390x", "product": { "name": "yum-common-3.2.29-0.19.30.s390x", "product_id": "yum-common-3.2.29-0.19.30.s390x" } }, { "category": "product_version", "name": "zypp-plugin-spacewalk-0.9.8-0.15.51.s390x", "product": { "name": "zypp-plugin-spacewalk-0.9.8-0.15.51.s390x", "product_id": "zypp-plugin-spacewalk-0.9.8-0.15.51.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_name", "name": "SUSE Manager 2.1", "product": { "name": "SUSE Manager 2.1", "product_id": "SUSE Manager 2.1", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-server:2.1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "apache2-mod_wsgi-3.3-5.7.17.s390x as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:apache2-mod_wsgi-3.3-5.7.17.s390x" }, "product_reference": "apache2-mod_wsgi-3.3-5.7.17.s390x", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "auditlog-keeper-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:auditlog-keeper-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch" }, "product_reference": "auditlog-keeper-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "auditlog-keeper-rdbms-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:auditlog-keeper-rdbms-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch" }, "product_reference": "auditlog-keeper-rdbms-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "auditlog-keeper-spacewalk-validator-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:auditlog-keeper-spacewalk-validator-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch" }, "product_reference": "auditlog-keeper-spacewalk-validator-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "auditlog-keeper-syslog-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:auditlog-keeper-syslog-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch" }, "product_reference": "auditlog-keeper-syslog-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "auditlog-keeper-xmlout-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:auditlog-keeper-xmlout-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch" }, "product_reference": "auditlog-keeper-xmlout-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "cobbler-2.2.2-0.54.9.s390x as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:cobbler-2.2.2-0.54.9.s390x" }, "product_reference": "cobbler-2.2.2-0.54.9.s390x", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "google-gson-2.2.4-0.7.52.noarch as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:google-gson-2.2.4-0.7.52.noarch" }, "product_reference": "google-gson-2.2.4-0.7.52.noarch", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0-2-0.1.3-0.10.16.11.s390x as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:libyaml-0-2-0.1.3-0.10.16.11.s390x" }, "product_reference": "libyaml-0-2-0.1.3-0.10.16.11.s390x", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "oracle-config-1.1-0.10.10.16.noarch as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:oracle-config-1.1-0.10.10.16.noarch" }, "product_reference": "oracle-config-1.1-0.10.10.16.noarch", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "osa-dispatcher-5.11.33.7-0.7.16.noarch as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:osa-dispatcher-5.11.33.7-0.7.16.noarch" }, "product_reference": "osa-dispatcher-5.11.33.7-0.7.16.noarch", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "perl-Class-Singleton-1.4-4.13.38.noarch as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:perl-Class-Singleton-1.4-4.13.38.noarch" }, "product_reference": "perl-Class-Singleton-1.4-4.13.38.noarch", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "perl-NOCpulse-Object-1.26.13.2-0.7.13.noarch as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:perl-NOCpulse-Object-1.26.13.2-0.7.13.noarch" }, "product_reference": "perl-NOCpulse-Object-1.26.13.2-0.7.13.noarch", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "perl-Satcon-1.20.2-0.7.6.noarch as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:perl-Satcon-1.20.2-0.7.6.noarch" }, "product_reference": "perl-Satcon-1.20.2-0.7.6.noarch", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "perl-auditlog-keeper-client-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:perl-auditlog-keeper-client-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch" }, "product_reference": "perl-auditlog-keeper-client-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql91-pltcl-9.1.15-0.3.1.s390x as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:postgresql91-pltcl-9.1.15-0.3.1.s390x" }, "product_reference": "postgresql91-pltcl-9.1.15-0.3.1.s390x", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "pxe-default-image-0.1-0.20.56.noarch as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:pxe-default-image-0.1-0.20.56.noarch" }, "product_reference": "pxe-default-image-0.1-0.20.56.noarch", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "python-enum34-1.0-0.7.33.s390x as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:python-enum34-1.0-0.7.33.s390x" }, "product_reference": "python-enum34-1.0-0.7.33.s390x", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "python-gzipstream-1.10.2.2-0.7.6.s390x as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:python-gzipstream-1.10.2.2-0.7.6.s390x" }, "product_reference": "python-gzipstream-1.10.2.2-0.7.6.s390x", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhn-custom-info-5.4.22.6-0.7.13.noarch as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:rhn-custom-info-5.4.22.6-0.7.13.noarch" }, "product_reference": "rhn-custom-info-5.4.22.6-0.7.13.noarch", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhnlib-2.5.69.6-0.7.6.s390x as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:rhnlib-2.5.69.6-0.7.6.s390x" }, "product_reference": "rhnlib-2.5.69.6-0.7.6.s390x", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhnmd-5.3.18.4-0.7.15.noarch as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:rhnmd-5.3.18.4-0.7.15.noarch" }, "product_reference": "rhnmd-5.3.18.4-0.7.15.noarch", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhnpush-5.5.71.7-0.7.16.noarch as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:rhnpush-5.5.71.7-0.7.16.noarch" }, "product_reference": "rhnpush-5.5.71.7-0.7.16.noarch", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "sm-ncc-sync-data-2.1.9-0.7.6.noarch as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:sm-ncc-sync-data-2.1.9-0.7.6.noarch" }, "product_reference": "sm-ncc-sync-data-2.1.9-0.7.6.noarch", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "smdba-1.5.1-0.7.6.s390x as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:smdba-1.5.1-0.7.6.s390x" }, "product_reference": "smdba-1.5.1-0.7.6.s390x", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "spacecmd-2.1.25.7-0.7.9.s390x as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:spacecmd-2.1.25.7-0.7.9.s390x" }, "product_reference": "spacecmd-2.1.25.7-0.7.9.s390x", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-admin-2.1.2.4-0.7.6.noarch as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:spacewalk-admin-2.1.2.4-0.7.6.noarch" }, "product_reference": "spacewalk-admin-2.1.2.4-0.7.6.noarch", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-backend-2.1.55.15-0.7.11.s390x as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:spacewalk-backend-2.1.55.15-0.7.11.s390x" }, "product_reference": "spacewalk-backend-2.1.55.15-0.7.11.s390x", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-backend-app-2.1.55.15-0.7.11.s390x as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:spacewalk-backend-app-2.1.55.15-0.7.11.s390x" }, "product_reference": "spacewalk-backend-app-2.1.55.15-0.7.11.s390x", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-backend-applet-2.1.55.15-0.7.11.s390x as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:spacewalk-backend-applet-2.1.55.15-0.7.11.s390x" }, "product_reference": "spacewalk-backend-applet-2.1.55.15-0.7.11.s390x", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-backend-config-files-2.1.55.15-0.7.11.s390x as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:spacewalk-backend-config-files-2.1.55.15-0.7.11.s390x" }, "product_reference": "spacewalk-backend-config-files-2.1.55.15-0.7.11.s390x", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-backend-config-files-common-2.1.55.15-0.7.11.s390x as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:spacewalk-backend-config-files-common-2.1.55.15-0.7.11.s390x" }, "product_reference": "spacewalk-backend-config-files-common-2.1.55.15-0.7.11.s390x", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-backend-config-files-tool-2.1.55.15-0.7.11.s390x as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:spacewalk-backend-config-files-tool-2.1.55.15-0.7.11.s390x" }, "product_reference": "spacewalk-backend-config-files-tool-2.1.55.15-0.7.11.s390x", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-backend-iss-2.1.55.15-0.7.11.s390x as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:spacewalk-backend-iss-2.1.55.15-0.7.11.s390x" }, "product_reference": "spacewalk-backend-iss-2.1.55.15-0.7.11.s390x", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-backend-iss-export-2.1.55.15-0.7.11.s390x as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:spacewalk-backend-iss-export-2.1.55.15-0.7.11.s390x" }, "product_reference": "spacewalk-backend-iss-export-2.1.55.15-0.7.11.s390x", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-backend-libs-2.1.55.15-0.7.11.s390x as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:spacewalk-backend-libs-2.1.55.15-0.7.11.s390x" }, "product_reference": "spacewalk-backend-libs-2.1.55.15-0.7.11.s390x", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-backend-package-push-server-2.1.55.15-0.7.11.s390x as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:spacewalk-backend-package-push-server-2.1.55.15-0.7.11.s390x" }, "product_reference": "spacewalk-backend-package-push-server-2.1.55.15-0.7.11.s390x", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-backend-server-2.1.55.15-0.7.11.s390x as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:spacewalk-backend-server-2.1.55.15-0.7.11.s390x" }, "product_reference": "spacewalk-backend-server-2.1.55.15-0.7.11.s390x", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-backend-sql-2.1.55.15-0.7.11.s390x as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:spacewalk-backend-sql-2.1.55.15-0.7.11.s390x" }, "product_reference": "spacewalk-backend-sql-2.1.55.15-0.7.11.s390x", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-backend-sql-oracle-2.1.55.15-0.7.11.s390x as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:spacewalk-backend-sql-oracle-2.1.55.15-0.7.11.s390x" }, "product_reference": "spacewalk-backend-sql-oracle-2.1.55.15-0.7.11.s390x", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-backend-sql-postgresql-2.1.55.15-0.7.11.s390x as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:spacewalk-backend-sql-postgresql-2.1.55.15-0.7.11.s390x" }, "product_reference": "spacewalk-backend-sql-postgresql-2.1.55.15-0.7.11.s390x", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-backend-tools-2.1.55.15-0.7.11.s390x as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:spacewalk-backend-tools-2.1.55.15-0.7.11.s390x" }, "product_reference": "spacewalk-backend-tools-2.1.55.15-0.7.11.s390x", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-backend-xml-export-libs-2.1.55.15-0.7.11.s390x as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:spacewalk-backend-xml-export-libs-2.1.55.15-0.7.11.s390x" }, "product_reference": "spacewalk-backend-xml-export-libs-2.1.55.15-0.7.11.s390x", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-backend-xmlrpc-2.1.55.15-0.7.11.s390x as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:spacewalk-backend-xmlrpc-2.1.55.15-0.7.11.s390x" }, "product_reference": "spacewalk-backend-xmlrpc-2.1.55.15-0.7.11.s390x", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-base-2.1.60.12-0.7.7.noarch as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:spacewalk-base-2.1.60.12-0.7.7.noarch" }, "product_reference": "spacewalk-base-2.1.60.12-0.7.7.noarch", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-base-minimal-2.1.60.12-0.7.7.noarch as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:spacewalk-base-minimal-2.1.60.12-0.7.7.noarch" }, "product_reference": "spacewalk-base-minimal-2.1.60.12-0.7.7.noarch", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-base-minimal-config-2.1.60.12-0.7.7.noarch as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:spacewalk-base-minimal-config-2.1.60.12-0.7.7.noarch" }, "product_reference": "spacewalk-base-minimal-config-2.1.60.12-0.7.7.noarch", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-branding-2.1.33.10-0.7.16.s390x as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:spacewalk-branding-2.1.33.10-0.7.16.s390x" }, "product_reference": "spacewalk-branding-2.1.33.10-0.7.16.s390x", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-certs-tools-2.1.6.5-0.7.10.noarch as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:spacewalk-certs-tools-2.1.6.5-0.7.10.noarch" }, "product_reference": "spacewalk-certs-tools-2.1.6.5-0.7.10.noarch", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-check-2.1.16.6-0.7.9.noarch as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:spacewalk-check-2.1.16.6-0.7.9.noarch" }, "product_reference": "spacewalk-check-2.1.16.6-0.7.9.noarch", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-client-setup-2.1.16.6-0.7.9.noarch as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:spacewalk-client-setup-2.1.16.6-0.7.9.noarch" }, "product_reference": "spacewalk-client-setup-2.1.16.6-0.7.9.noarch", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-client-tools-2.1.16.6-0.7.9.noarch as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:spacewalk-client-tools-2.1.16.6-0.7.9.noarch" }, "product_reference": "spacewalk-client-tools-2.1.16.6-0.7.9.noarch", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-config-2.1.5.4-0.7.15.noarch as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:spacewalk-config-2.1.5.4-0.7.15.noarch" }, "product_reference": "spacewalk-config-2.1.5.4-0.7.15.noarch", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-doc-indexes-2.1.2.3-0.7.26.noarch as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:spacewalk-doc-indexes-2.1.2.3-0.7.26.noarch" }, "product_reference": "spacewalk-doc-indexes-2.1.2.3-0.7.26.noarch", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-grail-2.1.60.12-0.7.7.noarch as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:spacewalk-grail-2.1.60.12-0.7.7.noarch" }, "product_reference": "spacewalk-grail-2.1.60.12-0.7.7.noarch", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-html-2.1.60.12-0.7.7.noarch as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:spacewalk-html-2.1.60.12-0.7.7.noarch" }, "product_reference": "spacewalk-html-2.1.60.12-0.7.7.noarch", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-java-2.1.165.14-0.7.16.noarch as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:spacewalk-java-2.1.165.14-0.7.16.noarch" }, "product_reference": "spacewalk-java-2.1.165.14-0.7.16.noarch", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-java-config-2.1.165.14-0.7.16.noarch as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:spacewalk-java-config-2.1.165.14-0.7.16.noarch" }, "product_reference": "spacewalk-java-config-2.1.165.14-0.7.16.noarch", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-java-lib-2.1.165.14-0.7.16.noarch as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:spacewalk-java-lib-2.1.165.14-0.7.16.noarch" }, "product_reference": "spacewalk-java-lib-2.1.165.14-0.7.16.noarch", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-java-oracle-2.1.165.14-0.7.16.noarch as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:spacewalk-java-oracle-2.1.165.14-0.7.16.noarch" }, "product_reference": "spacewalk-java-oracle-2.1.165.14-0.7.16.noarch", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-java-postgresql-2.1.165.14-0.7.16.noarch as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:spacewalk-java-postgresql-2.1.165.14-0.7.16.noarch" }, "product_reference": "spacewalk-java-postgresql-2.1.165.14-0.7.16.noarch", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-pxt-2.1.60.12-0.7.7.noarch as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:spacewalk-pxt-2.1.60.12-0.7.7.noarch" }, "product_reference": "spacewalk-pxt-2.1.60.12-0.7.7.noarch", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-reports-2.1.14.8-0.7.10.noarch as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:spacewalk-reports-2.1.14.8-0.7.10.noarch" }, "product_reference": "spacewalk-reports-2.1.14.8-0.7.10.noarch", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-search-2.1.14.6-0.7.18.noarch as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:spacewalk-search-2.1.14.6-0.7.18.noarch" }, "product_reference": "spacewalk-search-2.1.14.6-0.7.18.noarch", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-setup-2.1.14.9-0.7.6.noarch as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:spacewalk-setup-2.1.14.9-0.7.6.noarch" }, "product_reference": "spacewalk-setup-2.1.14.9-0.7.6.noarch", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-setup-jabberd-2.1.0.2-0.7.6.noarch as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:spacewalk-setup-jabberd-2.1.0.2-0.7.6.noarch" }, "product_reference": "spacewalk-setup-jabberd-2.1.0.2-0.7.6.noarch", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-sniglets-2.1.60.12-0.7.7.noarch as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:spacewalk-sniglets-2.1.60.12-0.7.7.noarch" }, "product_reference": "spacewalk-sniglets-2.1.60.12-0.7.7.noarch", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-taskomatic-2.1.165.14-0.7.16.noarch as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:spacewalk-taskomatic-2.1.165.14-0.7.16.noarch" }, "product_reference": "spacewalk-taskomatic-2.1.165.14-0.7.16.noarch", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-utils-2.1.27.12-0.7.25.noarch as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:spacewalk-utils-2.1.27.12-0.7.25.noarch" }, "product_reference": "spacewalk-utils-2.1.27.12-0.7.25.noarch", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalksd-5.0.14.6-0.7.15.s390x as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:spacewalksd-5.0.14.6-0.7.15.s390x" }, "product_reference": "spacewalksd-5.0.14.6-0.7.15.s390x", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "struts-1.2.9-162.33.22.noarch as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:struts-1.2.9-162.33.22.noarch" }, "product_reference": "struts-1.2.9-162.33.22.noarch", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "supportutils-plugin-susemanager-1.0.3-0.5.5.noarch as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:supportutils-plugin-susemanager-1.0.3-0.5.5.noarch" }, "product_reference": "supportutils-plugin-susemanager-1.0.3-0.5.5.noarch", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "supportutils-plugin-susemanager-client-1.0.4-0.5.5.noarch as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:supportutils-plugin-susemanager-client-1.0.4-0.5.5.noarch" }, "product_reference": "supportutils-plugin-susemanager-client-1.0.4-0.5.5.noarch", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "suseRegisterInfo-2.1.9-0.7.29.s390x as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:suseRegisterInfo-2.1.9-0.7.29.s390x" }, "product_reference": "suseRegisterInfo-2.1.9-0.7.29.s390x", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "susemanager-2.1.17-0.7.11.s390x as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:susemanager-2.1.17-0.7.11.s390x" }, "product_reference": "susemanager-2.1.17-0.7.11.s390x", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "susemanager-client-config_en-pdf-2.1-0.15.24.noarch as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:susemanager-client-config_en-pdf-2.1-0.15.24.noarch" }, "product_reference": "susemanager-client-config_en-pdf-2.1-0.15.24.noarch", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "susemanager-install_en-pdf-2.1-0.15.24.noarch as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:susemanager-install_en-pdf-2.1-0.15.24.noarch" }, "product_reference": "susemanager-install_en-pdf-2.1-0.15.24.noarch", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "susemanager-jsp_en-2.1-0.15.23.noarch as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:susemanager-jsp_en-2.1-0.15.23.noarch" }, "product_reference": "susemanager-jsp_en-2.1-0.15.23.noarch", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "susemanager-manuals_en-2.1-0.15.24.noarch as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:susemanager-manuals_en-2.1-0.15.24.noarch" }, "product_reference": "susemanager-manuals_en-2.1-0.15.24.noarch", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "susemanager-proxy-quick_en-pdf-2.1-0.15.24.noarch as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:susemanager-proxy-quick_en-pdf-2.1-0.15.24.noarch" }, "product_reference": "susemanager-proxy-quick_en-pdf-2.1-0.15.24.noarch", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "susemanager-reference_en-pdf-2.1-0.15.24.noarch as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:susemanager-reference_en-pdf-2.1-0.15.24.noarch" }, "product_reference": "susemanager-reference_en-pdf-2.1-0.15.24.noarch", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "susemanager-schema-2.1.50.11-0.7.8.noarch as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:susemanager-schema-2.1.50.11-0.7.8.noarch" }, "product_reference": "susemanager-schema-2.1.50.11-0.7.8.noarch", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "susemanager-sync-data-2.1.5-0.7.6.noarch as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:susemanager-sync-data-2.1.5-0.7.6.noarch" }, "product_reference": "susemanager-sync-data-2.1.5-0.7.6.noarch", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "susemanager-tools-2.1.17-0.7.11.s390x as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:susemanager-tools-2.1.17-0.7.11.s390x" }, "product_reference": "susemanager-tools-2.1.17-0.7.11.s390x", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "susemanager-user_en-pdf-2.1-0.15.24.noarch as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:susemanager-user_en-pdf-2.1-0.15.24.noarch" }, "product_reference": "susemanager-user_en-pdf-2.1-0.15.24.noarch", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "tanukiwrapper-3.2.3-0.10.12.s390x as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:tanukiwrapper-3.2.3-0.10.12.s390x" }, "product_reference": "tanukiwrapper-3.2.3-0.10.12.s390x", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "yum-3.2.29-0.19.30.s390x as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:yum-3.2.29-0.19.30.s390x" }, "product_reference": "yum-3.2.29-0.19.30.s390x", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "yum-common-3.2.29-0.19.30.s390x as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:yum-common-3.2.29-0.19.30.s390x" }, "product_reference": "yum-common-3.2.29-0.19.30.s390x", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "zypp-plugin-spacewalk-0.9.8-0.15.51.s390x as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:zypp-plugin-spacewalk-0.9.8-0.15.51.s390x" }, "product_reference": "zypp-plugin-spacewalk-0.9.8-0.15.51.s390x", "relates_to_product_reference": "SUSE Manager 2.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2014-0114", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0114" } ], "notes": [ { "category": "general", "text": "Apache Commons BeanUtils, as distributed in lib/commons-beanutils-1.8.0.jar in Apache Struts 1.x through 1.3.10 and in other products requiring commons-beanutils through 1.9.2, does not suppress the class property, which allows remote attackers to \"manipulate\" the ClassLoader and execute arbitrary code via the class parameter, as demonstrated by the passing of this parameter to the getClass method of the ActionForm object in Struts 1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager 2.1:apache2-mod_wsgi-3.3-5.7.17.s390x", "SUSE Manager 2.1:auditlog-keeper-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:auditlog-keeper-rdbms-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:auditlog-keeper-spacewalk-validator-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:auditlog-keeper-syslog-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:auditlog-keeper-xmlout-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:cobbler-2.2.2-0.54.9.s390x", "SUSE Manager 2.1:google-gson-2.2.4-0.7.52.noarch", "SUSE Manager 2.1:libyaml-0-2-0.1.3-0.10.16.11.s390x", "SUSE Manager 2.1:oracle-config-1.1-0.10.10.16.noarch", "SUSE Manager 2.1:osa-dispatcher-5.11.33.7-0.7.16.noarch", "SUSE Manager 2.1:perl-Class-Singleton-1.4-4.13.38.noarch", "SUSE Manager 2.1:perl-NOCpulse-Object-1.26.13.2-0.7.13.noarch", "SUSE Manager 2.1:perl-Satcon-1.20.2-0.7.6.noarch", "SUSE Manager 2.1:perl-auditlog-keeper-client-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:postgresql91-pltcl-9.1.15-0.3.1.s390x", "SUSE Manager 2.1:pxe-default-image-0.1-0.20.56.noarch", "SUSE Manager 2.1:python-enum34-1.0-0.7.33.s390x", "SUSE Manager 2.1:python-gzipstream-1.10.2.2-0.7.6.s390x", "SUSE Manager 2.1:rhn-custom-info-5.4.22.6-0.7.13.noarch", "SUSE Manager 2.1:rhnlib-2.5.69.6-0.7.6.s390x", "SUSE Manager 2.1:rhnmd-5.3.18.4-0.7.15.noarch", "SUSE Manager 2.1:rhnpush-5.5.71.7-0.7.16.noarch", "SUSE Manager 2.1:sm-ncc-sync-data-2.1.9-0.7.6.noarch", "SUSE Manager 2.1:smdba-1.5.1-0.7.6.s390x", "SUSE Manager 2.1:spacecmd-2.1.25.7-0.7.9.s390x", "SUSE Manager 2.1:spacewalk-admin-2.1.2.4-0.7.6.noarch", "SUSE Manager 2.1:spacewalk-backend-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-app-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-applet-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-config-files-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-config-files-common-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-config-files-tool-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-iss-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-iss-export-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-libs-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-package-push-server-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-server-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-sql-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-sql-oracle-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-sql-postgresql-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-tools-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-xml-export-libs-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-xmlrpc-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-base-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-base-minimal-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-base-minimal-config-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-branding-2.1.33.10-0.7.16.s390x", "SUSE Manager 2.1:spacewalk-certs-tools-2.1.6.5-0.7.10.noarch", "SUSE Manager 2.1:spacewalk-check-2.1.16.6-0.7.9.noarch", "SUSE Manager 2.1:spacewalk-client-setup-2.1.16.6-0.7.9.noarch", "SUSE Manager 2.1:spacewalk-client-tools-2.1.16.6-0.7.9.noarch", "SUSE Manager 2.1:spacewalk-config-2.1.5.4-0.7.15.noarch", "SUSE Manager 2.1:spacewalk-doc-indexes-2.1.2.3-0.7.26.noarch", "SUSE Manager 2.1:spacewalk-grail-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-html-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-java-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-java-config-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-java-lib-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-java-oracle-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-java-postgresql-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-pxt-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-reports-2.1.14.8-0.7.10.noarch", "SUSE Manager 2.1:spacewalk-search-2.1.14.6-0.7.18.noarch", "SUSE Manager 2.1:spacewalk-setup-2.1.14.9-0.7.6.noarch", "SUSE Manager 2.1:spacewalk-setup-jabberd-2.1.0.2-0.7.6.noarch", "SUSE Manager 2.1:spacewalk-sniglets-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-taskomatic-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-utils-2.1.27.12-0.7.25.noarch", "SUSE Manager 2.1:spacewalksd-5.0.14.6-0.7.15.s390x", "SUSE Manager 2.1:struts-1.2.9-162.33.22.noarch", "SUSE Manager 2.1:supportutils-plugin-susemanager-1.0.3-0.5.5.noarch", "SUSE Manager 2.1:supportutils-plugin-susemanager-client-1.0.4-0.5.5.noarch", "SUSE Manager 2.1:suseRegisterInfo-2.1.9-0.7.29.s390x", "SUSE Manager 2.1:susemanager-2.1.17-0.7.11.s390x", "SUSE Manager 2.1:susemanager-client-config_en-pdf-2.1-0.15.24.noarch", "SUSE Manager 2.1:susemanager-install_en-pdf-2.1-0.15.24.noarch", "SUSE Manager 2.1:susemanager-jsp_en-2.1-0.15.23.noarch", "SUSE Manager 2.1:susemanager-manuals_en-2.1-0.15.24.noarch", "SUSE Manager 2.1:susemanager-proxy-quick_en-pdf-2.1-0.15.24.noarch", "SUSE Manager 2.1:susemanager-reference_en-pdf-2.1-0.15.24.noarch", "SUSE Manager 2.1:susemanager-schema-2.1.50.11-0.7.8.noarch", "SUSE Manager 2.1:susemanager-sync-data-2.1.5-0.7.6.noarch", "SUSE Manager 2.1:susemanager-tools-2.1.17-0.7.11.s390x", "SUSE Manager 2.1:susemanager-user_en-pdf-2.1-0.15.24.noarch", "SUSE Manager 2.1:tanukiwrapper-3.2.3-0.10.12.s390x", "SUSE Manager 2.1:yum-3.2.29-0.19.30.s390x", "SUSE Manager 2.1:yum-common-3.2.29-0.19.30.s390x", "SUSE Manager 2.1:zypp-plugin-spacewalk-0.9.8-0.15.51.s390x" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0114", "url": "https://www.suse.com/security/cve/CVE-2014-0114" }, { "category": "external", "summary": "SUSE Bug 778464 for CVE-2014-0114", "url": "https://bugzilla.suse.com/778464" }, { "category": "external", "summary": "SUSE Bug 875455 for CVE-2014-0114", "url": "https://bugzilla.suse.com/875455" }, { "category": "external", "summary": "SUSE Bug 885963 for CVE-2014-0114", "url": "https://bugzilla.suse.com/885963" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager 2.1:apache2-mod_wsgi-3.3-5.7.17.s390x", "SUSE Manager 2.1:auditlog-keeper-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:auditlog-keeper-rdbms-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:auditlog-keeper-spacewalk-validator-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:auditlog-keeper-syslog-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:auditlog-keeper-xmlout-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:cobbler-2.2.2-0.54.9.s390x", "SUSE Manager 2.1:google-gson-2.2.4-0.7.52.noarch", "SUSE Manager 2.1:libyaml-0-2-0.1.3-0.10.16.11.s390x", "SUSE Manager 2.1:oracle-config-1.1-0.10.10.16.noarch", "SUSE Manager 2.1:osa-dispatcher-5.11.33.7-0.7.16.noarch", "SUSE Manager 2.1:perl-Class-Singleton-1.4-4.13.38.noarch", "SUSE Manager 2.1:perl-NOCpulse-Object-1.26.13.2-0.7.13.noarch", "SUSE Manager 2.1:perl-Satcon-1.20.2-0.7.6.noarch", "SUSE Manager 2.1:perl-auditlog-keeper-client-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:postgresql91-pltcl-9.1.15-0.3.1.s390x", "SUSE Manager 2.1:pxe-default-image-0.1-0.20.56.noarch", "SUSE Manager 2.1:python-enum34-1.0-0.7.33.s390x", "SUSE Manager 2.1:python-gzipstream-1.10.2.2-0.7.6.s390x", "SUSE Manager 2.1:rhn-custom-info-5.4.22.6-0.7.13.noarch", "SUSE Manager 2.1:rhnlib-2.5.69.6-0.7.6.s390x", "SUSE Manager 2.1:rhnmd-5.3.18.4-0.7.15.noarch", "SUSE Manager 2.1:rhnpush-5.5.71.7-0.7.16.noarch", "SUSE Manager 2.1:sm-ncc-sync-data-2.1.9-0.7.6.noarch", "SUSE Manager 2.1:smdba-1.5.1-0.7.6.s390x", "SUSE Manager 2.1:spacecmd-2.1.25.7-0.7.9.s390x", "SUSE Manager 2.1:spacewalk-admin-2.1.2.4-0.7.6.noarch", "SUSE Manager 2.1:spacewalk-backend-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-app-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-applet-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-config-files-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-config-files-common-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-config-files-tool-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-iss-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-iss-export-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-libs-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-package-push-server-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-server-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-sql-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-sql-oracle-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-sql-postgresql-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-tools-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-xml-export-libs-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-xmlrpc-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-base-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-base-minimal-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-base-minimal-config-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-branding-2.1.33.10-0.7.16.s390x", "SUSE Manager 2.1:spacewalk-certs-tools-2.1.6.5-0.7.10.noarch", "SUSE Manager 2.1:spacewalk-check-2.1.16.6-0.7.9.noarch", "SUSE Manager 2.1:spacewalk-client-setup-2.1.16.6-0.7.9.noarch", "SUSE Manager 2.1:spacewalk-client-tools-2.1.16.6-0.7.9.noarch", "SUSE Manager 2.1:spacewalk-config-2.1.5.4-0.7.15.noarch", "SUSE Manager 2.1:spacewalk-doc-indexes-2.1.2.3-0.7.26.noarch", "SUSE Manager 2.1:spacewalk-grail-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-html-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-java-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-java-config-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-java-lib-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-java-oracle-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-java-postgresql-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-pxt-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-reports-2.1.14.8-0.7.10.noarch", "SUSE Manager 2.1:spacewalk-search-2.1.14.6-0.7.18.noarch", "SUSE Manager 2.1:spacewalk-setup-2.1.14.9-0.7.6.noarch", "SUSE Manager 2.1:spacewalk-setup-jabberd-2.1.0.2-0.7.6.noarch", "SUSE Manager 2.1:spacewalk-sniglets-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-taskomatic-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-utils-2.1.27.12-0.7.25.noarch", "SUSE Manager 2.1:spacewalksd-5.0.14.6-0.7.15.s390x", "SUSE Manager 2.1:struts-1.2.9-162.33.22.noarch", "SUSE Manager 2.1:supportutils-plugin-susemanager-1.0.3-0.5.5.noarch", "SUSE Manager 2.1:supportutils-plugin-susemanager-client-1.0.4-0.5.5.noarch", "SUSE Manager 2.1:suseRegisterInfo-2.1.9-0.7.29.s390x", "SUSE Manager 2.1:susemanager-2.1.17-0.7.11.s390x", "SUSE Manager 2.1:susemanager-client-config_en-pdf-2.1-0.15.24.noarch", "SUSE Manager 2.1:susemanager-install_en-pdf-2.1-0.15.24.noarch", "SUSE Manager 2.1:susemanager-jsp_en-2.1-0.15.23.noarch", "SUSE Manager 2.1:susemanager-manuals_en-2.1-0.15.24.noarch", "SUSE Manager 2.1:susemanager-proxy-quick_en-pdf-2.1-0.15.24.noarch", "SUSE Manager 2.1:susemanager-reference_en-pdf-2.1-0.15.24.noarch", "SUSE Manager 2.1:susemanager-schema-2.1.50.11-0.7.8.noarch", "SUSE Manager 2.1:susemanager-sync-data-2.1.5-0.7.6.noarch", "SUSE Manager 2.1:susemanager-tools-2.1.17-0.7.11.s390x", "SUSE Manager 2.1:susemanager-user_en-pdf-2.1-0.15.24.noarch", "SUSE Manager 2.1:tanukiwrapper-3.2.3-0.10.12.s390x", "SUSE Manager 2.1:yum-3.2.29-0.19.30.s390x", "SUSE Manager 2.1:yum-common-3.2.29-0.19.30.s390x", "SUSE Manager 2.1:zypp-plugin-spacewalk-0.9.8-0.15.51.s390x" ] } ], "threats": [ { "category": "impact", "date": "2015-02-25T20:05:05Z", "details": "important" } ], "title": "CVE-2014-0114" }, { "cve": "CVE-2014-0240", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0240" } ], "notes": [ { "category": "general", "text": "The mod_wsgi module before 3.5 for Apache, when daemon mode is enabled, does not properly handle error codes returned by setuid when run on certain Linux kernels, which allows local users to gain privileges via vectors related to the number of running processes.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager 2.1:apache2-mod_wsgi-3.3-5.7.17.s390x", "SUSE Manager 2.1:auditlog-keeper-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:auditlog-keeper-rdbms-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:auditlog-keeper-spacewalk-validator-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:auditlog-keeper-syslog-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:auditlog-keeper-xmlout-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:cobbler-2.2.2-0.54.9.s390x", "SUSE Manager 2.1:google-gson-2.2.4-0.7.52.noarch", "SUSE Manager 2.1:libyaml-0-2-0.1.3-0.10.16.11.s390x", "SUSE Manager 2.1:oracle-config-1.1-0.10.10.16.noarch", "SUSE Manager 2.1:osa-dispatcher-5.11.33.7-0.7.16.noarch", "SUSE Manager 2.1:perl-Class-Singleton-1.4-4.13.38.noarch", "SUSE Manager 2.1:perl-NOCpulse-Object-1.26.13.2-0.7.13.noarch", "SUSE Manager 2.1:perl-Satcon-1.20.2-0.7.6.noarch", "SUSE Manager 2.1:perl-auditlog-keeper-client-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:postgresql91-pltcl-9.1.15-0.3.1.s390x", "SUSE Manager 2.1:pxe-default-image-0.1-0.20.56.noarch", "SUSE Manager 2.1:python-enum34-1.0-0.7.33.s390x", "SUSE Manager 2.1:python-gzipstream-1.10.2.2-0.7.6.s390x", "SUSE Manager 2.1:rhn-custom-info-5.4.22.6-0.7.13.noarch", "SUSE Manager 2.1:rhnlib-2.5.69.6-0.7.6.s390x", "SUSE Manager 2.1:rhnmd-5.3.18.4-0.7.15.noarch", "SUSE Manager 2.1:rhnpush-5.5.71.7-0.7.16.noarch", "SUSE Manager 2.1:sm-ncc-sync-data-2.1.9-0.7.6.noarch", "SUSE Manager 2.1:smdba-1.5.1-0.7.6.s390x", "SUSE Manager 2.1:spacecmd-2.1.25.7-0.7.9.s390x", "SUSE Manager 2.1:spacewalk-admin-2.1.2.4-0.7.6.noarch", "SUSE Manager 2.1:spacewalk-backend-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-app-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-applet-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-config-files-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-config-files-common-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-config-files-tool-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-iss-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-iss-export-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-libs-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-package-push-server-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-server-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-sql-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-sql-oracle-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-sql-postgresql-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-tools-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-xml-export-libs-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-xmlrpc-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-base-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-base-minimal-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-base-minimal-config-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-branding-2.1.33.10-0.7.16.s390x", "SUSE Manager 2.1:spacewalk-certs-tools-2.1.6.5-0.7.10.noarch", "SUSE Manager 2.1:spacewalk-check-2.1.16.6-0.7.9.noarch", "SUSE Manager 2.1:spacewalk-client-setup-2.1.16.6-0.7.9.noarch", "SUSE Manager 2.1:spacewalk-client-tools-2.1.16.6-0.7.9.noarch", "SUSE Manager 2.1:spacewalk-config-2.1.5.4-0.7.15.noarch", "SUSE Manager 2.1:spacewalk-doc-indexes-2.1.2.3-0.7.26.noarch", "SUSE Manager 2.1:spacewalk-grail-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-html-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-java-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-java-config-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-java-lib-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-java-oracle-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-java-postgresql-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-pxt-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-reports-2.1.14.8-0.7.10.noarch", "SUSE Manager 2.1:spacewalk-search-2.1.14.6-0.7.18.noarch", "SUSE Manager 2.1:spacewalk-setup-2.1.14.9-0.7.6.noarch", "SUSE Manager 2.1:spacewalk-setup-jabberd-2.1.0.2-0.7.6.noarch", "SUSE Manager 2.1:spacewalk-sniglets-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-taskomatic-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-utils-2.1.27.12-0.7.25.noarch", "SUSE Manager 2.1:spacewalksd-5.0.14.6-0.7.15.s390x", "SUSE Manager 2.1:struts-1.2.9-162.33.22.noarch", "SUSE Manager 2.1:supportutils-plugin-susemanager-1.0.3-0.5.5.noarch", "SUSE Manager 2.1:supportutils-plugin-susemanager-client-1.0.4-0.5.5.noarch", "SUSE Manager 2.1:suseRegisterInfo-2.1.9-0.7.29.s390x", "SUSE Manager 2.1:susemanager-2.1.17-0.7.11.s390x", "SUSE Manager 2.1:susemanager-client-config_en-pdf-2.1-0.15.24.noarch", "SUSE Manager 2.1:susemanager-install_en-pdf-2.1-0.15.24.noarch", "SUSE Manager 2.1:susemanager-jsp_en-2.1-0.15.23.noarch", "SUSE Manager 2.1:susemanager-manuals_en-2.1-0.15.24.noarch", "SUSE Manager 2.1:susemanager-proxy-quick_en-pdf-2.1-0.15.24.noarch", "SUSE Manager 2.1:susemanager-reference_en-pdf-2.1-0.15.24.noarch", "SUSE Manager 2.1:susemanager-schema-2.1.50.11-0.7.8.noarch", "SUSE Manager 2.1:susemanager-sync-data-2.1.5-0.7.6.noarch", "SUSE Manager 2.1:susemanager-tools-2.1.17-0.7.11.s390x", "SUSE Manager 2.1:susemanager-user_en-pdf-2.1-0.15.24.noarch", "SUSE Manager 2.1:tanukiwrapper-3.2.3-0.10.12.s390x", "SUSE Manager 2.1:yum-3.2.29-0.19.30.s390x", "SUSE Manager 2.1:yum-common-3.2.29-0.19.30.s390x", "SUSE Manager 2.1:zypp-plugin-spacewalk-0.9.8-0.15.51.s390x" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0240", "url": "https://www.suse.com/security/cve/CVE-2014-0240" }, { "category": "external", "summary": "SUSE Bug 878550 for CVE-2014-0240", "url": "https://bugzilla.suse.com/878550" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager 2.1:apache2-mod_wsgi-3.3-5.7.17.s390x", "SUSE Manager 2.1:auditlog-keeper-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:auditlog-keeper-rdbms-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:auditlog-keeper-spacewalk-validator-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:auditlog-keeper-syslog-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:auditlog-keeper-xmlout-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:cobbler-2.2.2-0.54.9.s390x", "SUSE Manager 2.1:google-gson-2.2.4-0.7.52.noarch", "SUSE Manager 2.1:libyaml-0-2-0.1.3-0.10.16.11.s390x", "SUSE Manager 2.1:oracle-config-1.1-0.10.10.16.noarch", "SUSE Manager 2.1:osa-dispatcher-5.11.33.7-0.7.16.noarch", "SUSE Manager 2.1:perl-Class-Singleton-1.4-4.13.38.noarch", "SUSE Manager 2.1:perl-NOCpulse-Object-1.26.13.2-0.7.13.noarch", "SUSE Manager 2.1:perl-Satcon-1.20.2-0.7.6.noarch", "SUSE Manager 2.1:perl-auditlog-keeper-client-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:postgresql91-pltcl-9.1.15-0.3.1.s390x", "SUSE Manager 2.1:pxe-default-image-0.1-0.20.56.noarch", "SUSE Manager 2.1:python-enum34-1.0-0.7.33.s390x", "SUSE Manager 2.1:python-gzipstream-1.10.2.2-0.7.6.s390x", "SUSE Manager 2.1:rhn-custom-info-5.4.22.6-0.7.13.noarch", "SUSE Manager 2.1:rhnlib-2.5.69.6-0.7.6.s390x", "SUSE Manager 2.1:rhnmd-5.3.18.4-0.7.15.noarch", "SUSE Manager 2.1:rhnpush-5.5.71.7-0.7.16.noarch", "SUSE Manager 2.1:sm-ncc-sync-data-2.1.9-0.7.6.noarch", "SUSE Manager 2.1:smdba-1.5.1-0.7.6.s390x", "SUSE Manager 2.1:spacecmd-2.1.25.7-0.7.9.s390x", "SUSE Manager 2.1:spacewalk-admin-2.1.2.4-0.7.6.noarch", "SUSE Manager 2.1:spacewalk-backend-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-app-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-applet-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-config-files-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-config-files-common-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-config-files-tool-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-iss-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-iss-export-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-libs-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-package-push-server-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-server-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-sql-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-sql-oracle-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-sql-postgresql-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-tools-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-xml-export-libs-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-xmlrpc-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-base-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-base-minimal-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-base-minimal-config-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-branding-2.1.33.10-0.7.16.s390x", "SUSE Manager 2.1:spacewalk-certs-tools-2.1.6.5-0.7.10.noarch", "SUSE Manager 2.1:spacewalk-check-2.1.16.6-0.7.9.noarch", "SUSE Manager 2.1:spacewalk-client-setup-2.1.16.6-0.7.9.noarch", "SUSE Manager 2.1:spacewalk-client-tools-2.1.16.6-0.7.9.noarch", "SUSE Manager 2.1:spacewalk-config-2.1.5.4-0.7.15.noarch", "SUSE Manager 2.1:spacewalk-doc-indexes-2.1.2.3-0.7.26.noarch", "SUSE Manager 2.1:spacewalk-grail-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-html-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-java-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-java-config-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-java-lib-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-java-oracle-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-java-postgresql-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-pxt-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-reports-2.1.14.8-0.7.10.noarch", "SUSE Manager 2.1:spacewalk-search-2.1.14.6-0.7.18.noarch", "SUSE Manager 2.1:spacewalk-setup-2.1.14.9-0.7.6.noarch", "SUSE Manager 2.1:spacewalk-setup-jabberd-2.1.0.2-0.7.6.noarch", "SUSE Manager 2.1:spacewalk-sniglets-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-taskomatic-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-utils-2.1.27.12-0.7.25.noarch", "SUSE Manager 2.1:spacewalksd-5.0.14.6-0.7.15.s390x", "SUSE Manager 2.1:struts-1.2.9-162.33.22.noarch", "SUSE Manager 2.1:supportutils-plugin-susemanager-1.0.3-0.5.5.noarch", "SUSE Manager 2.1:supportutils-plugin-susemanager-client-1.0.4-0.5.5.noarch", "SUSE Manager 2.1:suseRegisterInfo-2.1.9-0.7.29.s390x", "SUSE Manager 2.1:susemanager-2.1.17-0.7.11.s390x", "SUSE Manager 2.1:susemanager-client-config_en-pdf-2.1-0.15.24.noarch", "SUSE Manager 2.1:susemanager-install_en-pdf-2.1-0.15.24.noarch", "SUSE Manager 2.1:susemanager-jsp_en-2.1-0.15.23.noarch", "SUSE Manager 2.1:susemanager-manuals_en-2.1-0.15.24.noarch", "SUSE Manager 2.1:susemanager-proxy-quick_en-pdf-2.1-0.15.24.noarch", "SUSE Manager 2.1:susemanager-reference_en-pdf-2.1-0.15.24.noarch", "SUSE Manager 2.1:susemanager-schema-2.1.50.11-0.7.8.noarch", "SUSE Manager 2.1:susemanager-sync-data-2.1.5-0.7.6.noarch", "SUSE Manager 2.1:susemanager-tools-2.1.17-0.7.11.s390x", "SUSE Manager 2.1:susemanager-user_en-pdf-2.1-0.15.24.noarch", "SUSE Manager 2.1:tanukiwrapper-3.2.3-0.10.12.s390x", "SUSE Manager 2.1:yum-3.2.29-0.19.30.s390x", "SUSE Manager 2.1:yum-common-3.2.29-0.19.30.s390x", "SUSE Manager 2.1:zypp-plugin-spacewalk-0.9.8-0.15.51.s390x" ] } ], "threats": [ { "category": "impact", "date": "2015-02-25T20:05:05Z", "details": "important" } ], "title": "CVE-2014-0240" }, { "cve": "CVE-2014-0242", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0242" } ], "notes": [ { "category": "general", "text": "mod_wsgi module before 3.4 for Apache, when used in embedded mode, might allow remote attackers to obtain sensitive information via the Content-Type header which is generated from memory that may have been freed and then overwritten by a separate thread.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager 2.1:apache2-mod_wsgi-3.3-5.7.17.s390x", "SUSE Manager 2.1:auditlog-keeper-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:auditlog-keeper-rdbms-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:auditlog-keeper-spacewalk-validator-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:auditlog-keeper-syslog-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:auditlog-keeper-xmlout-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:cobbler-2.2.2-0.54.9.s390x", "SUSE Manager 2.1:google-gson-2.2.4-0.7.52.noarch", "SUSE Manager 2.1:libyaml-0-2-0.1.3-0.10.16.11.s390x", "SUSE Manager 2.1:oracle-config-1.1-0.10.10.16.noarch", "SUSE Manager 2.1:osa-dispatcher-5.11.33.7-0.7.16.noarch", "SUSE Manager 2.1:perl-Class-Singleton-1.4-4.13.38.noarch", "SUSE Manager 2.1:perl-NOCpulse-Object-1.26.13.2-0.7.13.noarch", "SUSE Manager 2.1:perl-Satcon-1.20.2-0.7.6.noarch", "SUSE Manager 2.1:perl-auditlog-keeper-client-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:postgresql91-pltcl-9.1.15-0.3.1.s390x", "SUSE Manager 2.1:pxe-default-image-0.1-0.20.56.noarch", "SUSE Manager 2.1:python-enum34-1.0-0.7.33.s390x", "SUSE Manager 2.1:python-gzipstream-1.10.2.2-0.7.6.s390x", "SUSE Manager 2.1:rhn-custom-info-5.4.22.6-0.7.13.noarch", "SUSE Manager 2.1:rhnlib-2.5.69.6-0.7.6.s390x", "SUSE Manager 2.1:rhnmd-5.3.18.4-0.7.15.noarch", "SUSE Manager 2.1:rhnpush-5.5.71.7-0.7.16.noarch", "SUSE Manager 2.1:sm-ncc-sync-data-2.1.9-0.7.6.noarch", "SUSE Manager 2.1:smdba-1.5.1-0.7.6.s390x", "SUSE Manager 2.1:spacecmd-2.1.25.7-0.7.9.s390x", "SUSE Manager 2.1:spacewalk-admin-2.1.2.4-0.7.6.noarch", "SUSE Manager 2.1:spacewalk-backend-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-app-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-applet-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-config-files-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-config-files-common-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-config-files-tool-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-iss-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-iss-export-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-libs-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-package-push-server-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-server-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-sql-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-sql-oracle-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-sql-postgresql-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-tools-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-xml-export-libs-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-xmlrpc-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-base-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-base-minimal-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-base-minimal-config-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-branding-2.1.33.10-0.7.16.s390x", "SUSE Manager 2.1:spacewalk-certs-tools-2.1.6.5-0.7.10.noarch", "SUSE Manager 2.1:spacewalk-check-2.1.16.6-0.7.9.noarch", "SUSE Manager 2.1:spacewalk-client-setup-2.1.16.6-0.7.9.noarch", "SUSE Manager 2.1:spacewalk-client-tools-2.1.16.6-0.7.9.noarch", "SUSE Manager 2.1:spacewalk-config-2.1.5.4-0.7.15.noarch", "SUSE Manager 2.1:spacewalk-doc-indexes-2.1.2.3-0.7.26.noarch", "SUSE Manager 2.1:spacewalk-grail-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-html-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-java-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-java-config-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-java-lib-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-java-oracle-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-java-postgresql-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-pxt-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-reports-2.1.14.8-0.7.10.noarch", "SUSE Manager 2.1:spacewalk-search-2.1.14.6-0.7.18.noarch", "SUSE Manager 2.1:spacewalk-setup-2.1.14.9-0.7.6.noarch", "SUSE Manager 2.1:spacewalk-setup-jabberd-2.1.0.2-0.7.6.noarch", "SUSE Manager 2.1:spacewalk-sniglets-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-taskomatic-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-utils-2.1.27.12-0.7.25.noarch", "SUSE Manager 2.1:spacewalksd-5.0.14.6-0.7.15.s390x", "SUSE Manager 2.1:struts-1.2.9-162.33.22.noarch", "SUSE Manager 2.1:supportutils-plugin-susemanager-1.0.3-0.5.5.noarch", "SUSE Manager 2.1:supportutils-plugin-susemanager-client-1.0.4-0.5.5.noarch", "SUSE Manager 2.1:suseRegisterInfo-2.1.9-0.7.29.s390x", "SUSE Manager 2.1:susemanager-2.1.17-0.7.11.s390x", "SUSE Manager 2.1:susemanager-client-config_en-pdf-2.1-0.15.24.noarch", "SUSE Manager 2.1:susemanager-install_en-pdf-2.1-0.15.24.noarch", "SUSE Manager 2.1:susemanager-jsp_en-2.1-0.15.23.noarch", "SUSE Manager 2.1:susemanager-manuals_en-2.1-0.15.24.noarch", "SUSE Manager 2.1:susemanager-proxy-quick_en-pdf-2.1-0.15.24.noarch", "SUSE Manager 2.1:susemanager-reference_en-pdf-2.1-0.15.24.noarch", "SUSE Manager 2.1:susemanager-schema-2.1.50.11-0.7.8.noarch", "SUSE Manager 2.1:susemanager-sync-data-2.1.5-0.7.6.noarch", "SUSE Manager 2.1:susemanager-tools-2.1.17-0.7.11.s390x", "SUSE Manager 2.1:susemanager-user_en-pdf-2.1-0.15.24.noarch", "SUSE Manager 2.1:tanukiwrapper-3.2.3-0.10.12.s390x", "SUSE Manager 2.1:yum-3.2.29-0.19.30.s390x", "SUSE Manager 2.1:yum-common-3.2.29-0.19.30.s390x", "SUSE Manager 2.1:zypp-plugin-spacewalk-0.9.8-0.15.51.s390x" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0242", "url": "https://www.suse.com/security/cve/CVE-2014-0242" }, { "category": "external", "summary": "SUSE Bug 878553 for CVE-2014-0242", "url": "https://bugzilla.suse.com/878553" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager 2.1:apache2-mod_wsgi-3.3-5.7.17.s390x", "SUSE Manager 2.1:auditlog-keeper-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:auditlog-keeper-rdbms-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:auditlog-keeper-spacewalk-validator-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:auditlog-keeper-syslog-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:auditlog-keeper-xmlout-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:cobbler-2.2.2-0.54.9.s390x", "SUSE Manager 2.1:google-gson-2.2.4-0.7.52.noarch", "SUSE Manager 2.1:libyaml-0-2-0.1.3-0.10.16.11.s390x", "SUSE Manager 2.1:oracle-config-1.1-0.10.10.16.noarch", "SUSE Manager 2.1:osa-dispatcher-5.11.33.7-0.7.16.noarch", "SUSE Manager 2.1:perl-Class-Singleton-1.4-4.13.38.noarch", "SUSE Manager 2.1:perl-NOCpulse-Object-1.26.13.2-0.7.13.noarch", "SUSE Manager 2.1:perl-Satcon-1.20.2-0.7.6.noarch", "SUSE Manager 2.1:perl-auditlog-keeper-client-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:postgresql91-pltcl-9.1.15-0.3.1.s390x", "SUSE Manager 2.1:pxe-default-image-0.1-0.20.56.noarch", "SUSE Manager 2.1:python-enum34-1.0-0.7.33.s390x", "SUSE Manager 2.1:python-gzipstream-1.10.2.2-0.7.6.s390x", "SUSE Manager 2.1:rhn-custom-info-5.4.22.6-0.7.13.noarch", "SUSE Manager 2.1:rhnlib-2.5.69.6-0.7.6.s390x", "SUSE Manager 2.1:rhnmd-5.3.18.4-0.7.15.noarch", "SUSE Manager 2.1:rhnpush-5.5.71.7-0.7.16.noarch", "SUSE Manager 2.1:sm-ncc-sync-data-2.1.9-0.7.6.noarch", "SUSE Manager 2.1:smdba-1.5.1-0.7.6.s390x", "SUSE Manager 2.1:spacecmd-2.1.25.7-0.7.9.s390x", "SUSE Manager 2.1:spacewalk-admin-2.1.2.4-0.7.6.noarch", "SUSE Manager 2.1:spacewalk-backend-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-app-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-applet-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-config-files-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-config-files-common-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-config-files-tool-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-iss-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-iss-export-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-libs-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-package-push-server-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-server-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-sql-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-sql-oracle-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-sql-postgresql-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-tools-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-xml-export-libs-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-xmlrpc-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-base-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-base-minimal-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-base-minimal-config-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-branding-2.1.33.10-0.7.16.s390x", "SUSE Manager 2.1:spacewalk-certs-tools-2.1.6.5-0.7.10.noarch", "SUSE Manager 2.1:spacewalk-check-2.1.16.6-0.7.9.noarch", "SUSE Manager 2.1:spacewalk-client-setup-2.1.16.6-0.7.9.noarch", "SUSE Manager 2.1:spacewalk-client-tools-2.1.16.6-0.7.9.noarch", "SUSE Manager 2.1:spacewalk-config-2.1.5.4-0.7.15.noarch", "SUSE Manager 2.1:spacewalk-doc-indexes-2.1.2.3-0.7.26.noarch", "SUSE Manager 2.1:spacewalk-grail-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-html-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-java-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-java-config-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-java-lib-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-java-oracle-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-java-postgresql-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-pxt-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-reports-2.1.14.8-0.7.10.noarch", "SUSE Manager 2.1:spacewalk-search-2.1.14.6-0.7.18.noarch", "SUSE Manager 2.1:spacewalk-setup-2.1.14.9-0.7.6.noarch", "SUSE Manager 2.1:spacewalk-setup-jabberd-2.1.0.2-0.7.6.noarch", "SUSE Manager 2.1:spacewalk-sniglets-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-taskomatic-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-utils-2.1.27.12-0.7.25.noarch", "SUSE Manager 2.1:spacewalksd-5.0.14.6-0.7.15.s390x", "SUSE Manager 2.1:struts-1.2.9-162.33.22.noarch", "SUSE Manager 2.1:supportutils-plugin-susemanager-1.0.3-0.5.5.noarch", "SUSE Manager 2.1:supportutils-plugin-susemanager-client-1.0.4-0.5.5.noarch", "SUSE Manager 2.1:suseRegisterInfo-2.1.9-0.7.29.s390x", "SUSE Manager 2.1:susemanager-2.1.17-0.7.11.s390x", "SUSE Manager 2.1:susemanager-client-config_en-pdf-2.1-0.15.24.noarch", "SUSE Manager 2.1:susemanager-install_en-pdf-2.1-0.15.24.noarch", "SUSE Manager 2.1:susemanager-jsp_en-2.1-0.15.23.noarch", "SUSE Manager 2.1:susemanager-manuals_en-2.1-0.15.24.noarch", "SUSE Manager 2.1:susemanager-proxy-quick_en-pdf-2.1-0.15.24.noarch", "SUSE Manager 2.1:susemanager-reference_en-pdf-2.1-0.15.24.noarch", "SUSE Manager 2.1:susemanager-schema-2.1.50.11-0.7.8.noarch", "SUSE Manager 2.1:susemanager-sync-data-2.1.5-0.7.6.noarch", "SUSE Manager 2.1:susemanager-tools-2.1.17-0.7.11.s390x", "SUSE Manager 2.1:susemanager-user_en-pdf-2.1-0.15.24.noarch", "SUSE Manager 2.1:tanukiwrapper-3.2.3-0.10.12.s390x", "SUSE Manager 2.1:yum-3.2.29-0.19.30.s390x", "SUSE Manager 2.1:yum-common-3.2.29-0.19.30.s390x", "SUSE Manager 2.1:zypp-plugin-spacewalk-0.9.8-0.15.51.s390x" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Manager 2.1:apache2-mod_wsgi-3.3-5.7.17.s390x", "SUSE Manager 2.1:auditlog-keeper-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:auditlog-keeper-rdbms-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:auditlog-keeper-spacewalk-validator-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:auditlog-keeper-syslog-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:auditlog-keeper-xmlout-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:cobbler-2.2.2-0.54.9.s390x", "SUSE Manager 2.1:google-gson-2.2.4-0.7.52.noarch", "SUSE Manager 2.1:libyaml-0-2-0.1.3-0.10.16.11.s390x", "SUSE Manager 2.1:oracle-config-1.1-0.10.10.16.noarch", "SUSE Manager 2.1:osa-dispatcher-5.11.33.7-0.7.16.noarch", "SUSE Manager 2.1:perl-Class-Singleton-1.4-4.13.38.noarch", "SUSE Manager 2.1:perl-NOCpulse-Object-1.26.13.2-0.7.13.noarch", "SUSE Manager 2.1:perl-Satcon-1.20.2-0.7.6.noarch", "SUSE Manager 2.1:perl-auditlog-keeper-client-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:postgresql91-pltcl-9.1.15-0.3.1.s390x", "SUSE Manager 2.1:pxe-default-image-0.1-0.20.56.noarch", "SUSE Manager 2.1:python-enum34-1.0-0.7.33.s390x", "SUSE Manager 2.1:python-gzipstream-1.10.2.2-0.7.6.s390x", "SUSE Manager 2.1:rhn-custom-info-5.4.22.6-0.7.13.noarch", "SUSE Manager 2.1:rhnlib-2.5.69.6-0.7.6.s390x", "SUSE Manager 2.1:rhnmd-5.3.18.4-0.7.15.noarch", "SUSE Manager 2.1:rhnpush-5.5.71.7-0.7.16.noarch", "SUSE Manager 2.1:sm-ncc-sync-data-2.1.9-0.7.6.noarch", "SUSE Manager 2.1:smdba-1.5.1-0.7.6.s390x", "SUSE Manager 2.1:spacecmd-2.1.25.7-0.7.9.s390x", "SUSE Manager 2.1:spacewalk-admin-2.1.2.4-0.7.6.noarch", "SUSE Manager 2.1:spacewalk-backend-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-app-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-applet-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-config-files-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-config-files-common-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-config-files-tool-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-iss-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-iss-export-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-libs-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-package-push-server-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-server-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-sql-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-sql-oracle-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-sql-postgresql-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-tools-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-xml-export-libs-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-xmlrpc-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-base-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-base-minimal-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-base-minimal-config-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-branding-2.1.33.10-0.7.16.s390x", "SUSE Manager 2.1:spacewalk-certs-tools-2.1.6.5-0.7.10.noarch", "SUSE Manager 2.1:spacewalk-check-2.1.16.6-0.7.9.noarch", "SUSE Manager 2.1:spacewalk-client-setup-2.1.16.6-0.7.9.noarch", "SUSE Manager 2.1:spacewalk-client-tools-2.1.16.6-0.7.9.noarch", "SUSE Manager 2.1:spacewalk-config-2.1.5.4-0.7.15.noarch", "SUSE Manager 2.1:spacewalk-doc-indexes-2.1.2.3-0.7.26.noarch", "SUSE Manager 2.1:spacewalk-grail-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-html-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-java-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-java-config-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-java-lib-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-java-oracle-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-java-postgresql-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-pxt-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-reports-2.1.14.8-0.7.10.noarch", "SUSE Manager 2.1:spacewalk-search-2.1.14.6-0.7.18.noarch", "SUSE Manager 2.1:spacewalk-setup-2.1.14.9-0.7.6.noarch", "SUSE Manager 2.1:spacewalk-setup-jabberd-2.1.0.2-0.7.6.noarch", "SUSE Manager 2.1:spacewalk-sniglets-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-taskomatic-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-utils-2.1.27.12-0.7.25.noarch", "SUSE Manager 2.1:spacewalksd-5.0.14.6-0.7.15.s390x", "SUSE Manager 2.1:struts-1.2.9-162.33.22.noarch", "SUSE Manager 2.1:supportutils-plugin-susemanager-1.0.3-0.5.5.noarch", "SUSE Manager 2.1:supportutils-plugin-susemanager-client-1.0.4-0.5.5.noarch", "SUSE Manager 2.1:suseRegisterInfo-2.1.9-0.7.29.s390x", "SUSE Manager 2.1:susemanager-2.1.17-0.7.11.s390x", "SUSE Manager 2.1:susemanager-client-config_en-pdf-2.1-0.15.24.noarch", "SUSE Manager 2.1:susemanager-install_en-pdf-2.1-0.15.24.noarch", "SUSE Manager 2.1:susemanager-jsp_en-2.1-0.15.23.noarch", "SUSE Manager 2.1:susemanager-manuals_en-2.1-0.15.24.noarch", "SUSE Manager 2.1:susemanager-proxy-quick_en-pdf-2.1-0.15.24.noarch", "SUSE Manager 2.1:susemanager-reference_en-pdf-2.1-0.15.24.noarch", "SUSE Manager 2.1:susemanager-schema-2.1.50.11-0.7.8.noarch", "SUSE Manager 2.1:susemanager-sync-data-2.1.5-0.7.6.noarch", "SUSE Manager 2.1:susemanager-tools-2.1.17-0.7.11.s390x", "SUSE Manager 2.1:susemanager-user_en-pdf-2.1-0.15.24.noarch", "SUSE Manager 2.1:tanukiwrapper-3.2.3-0.10.12.s390x", "SUSE Manager 2.1:yum-3.2.29-0.19.30.s390x", "SUSE Manager 2.1:yum-common-3.2.29-0.19.30.s390x", "SUSE Manager 2.1:zypp-plugin-spacewalk-0.9.8-0.15.51.s390x" ] } ], "threats": [ { "category": "impact", "date": "2015-02-25T20:05:05Z", "details": "important" } ], "title": "CVE-2014-0242" }, { "cve": "CVE-2014-3654", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-3654" } ], "notes": [ { "category": "general", "text": "Multiple cross-site scripting (XSS) vulnerabilities in spacewalk-java 2.0.2 in Spacewalk and Red Hat Network (RHN) Satellite 5.5 and 5.6 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors to (1) kickstart/cobbler/CustomSnippetList.do, (2) channels/software/Entitlements.do, or (3) admin/multiorg/OrgUsers.do.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager 2.1:apache2-mod_wsgi-3.3-5.7.17.s390x", "SUSE Manager 2.1:auditlog-keeper-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:auditlog-keeper-rdbms-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:auditlog-keeper-spacewalk-validator-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:auditlog-keeper-syslog-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:auditlog-keeper-xmlout-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:cobbler-2.2.2-0.54.9.s390x", "SUSE Manager 2.1:google-gson-2.2.4-0.7.52.noarch", "SUSE Manager 2.1:libyaml-0-2-0.1.3-0.10.16.11.s390x", "SUSE Manager 2.1:oracle-config-1.1-0.10.10.16.noarch", "SUSE Manager 2.1:osa-dispatcher-5.11.33.7-0.7.16.noarch", "SUSE Manager 2.1:perl-Class-Singleton-1.4-4.13.38.noarch", "SUSE Manager 2.1:perl-NOCpulse-Object-1.26.13.2-0.7.13.noarch", "SUSE Manager 2.1:perl-Satcon-1.20.2-0.7.6.noarch", "SUSE Manager 2.1:perl-auditlog-keeper-client-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:postgresql91-pltcl-9.1.15-0.3.1.s390x", "SUSE Manager 2.1:pxe-default-image-0.1-0.20.56.noarch", "SUSE Manager 2.1:python-enum34-1.0-0.7.33.s390x", "SUSE Manager 2.1:python-gzipstream-1.10.2.2-0.7.6.s390x", "SUSE Manager 2.1:rhn-custom-info-5.4.22.6-0.7.13.noarch", "SUSE Manager 2.1:rhnlib-2.5.69.6-0.7.6.s390x", "SUSE Manager 2.1:rhnmd-5.3.18.4-0.7.15.noarch", "SUSE Manager 2.1:rhnpush-5.5.71.7-0.7.16.noarch", "SUSE Manager 2.1:sm-ncc-sync-data-2.1.9-0.7.6.noarch", "SUSE Manager 2.1:smdba-1.5.1-0.7.6.s390x", "SUSE Manager 2.1:spacecmd-2.1.25.7-0.7.9.s390x", "SUSE Manager 2.1:spacewalk-admin-2.1.2.4-0.7.6.noarch", "SUSE Manager 2.1:spacewalk-backend-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-app-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-applet-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-config-files-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-config-files-common-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-config-files-tool-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-iss-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-iss-export-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-libs-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-package-push-server-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-server-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-sql-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-sql-oracle-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-sql-postgresql-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-tools-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-xml-export-libs-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-xmlrpc-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-base-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-base-minimal-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-base-minimal-config-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-branding-2.1.33.10-0.7.16.s390x", "SUSE Manager 2.1:spacewalk-certs-tools-2.1.6.5-0.7.10.noarch", "SUSE Manager 2.1:spacewalk-check-2.1.16.6-0.7.9.noarch", "SUSE Manager 2.1:spacewalk-client-setup-2.1.16.6-0.7.9.noarch", "SUSE Manager 2.1:spacewalk-client-tools-2.1.16.6-0.7.9.noarch", "SUSE Manager 2.1:spacewalk-config-2.1.5.4-0.7.15.noarch", "SUSE Manager 2.1:spacewalk-doc-indexes-2.1.2.3-0.7.26.noarch", "SUSE Manager 2.1:spacewalk-grail-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-html-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-java-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-java-config-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-java-lib-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-java-oracle-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-java-postgresql-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-pxt-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-reports-2.1.14.8-0.7.10.noarch", "SUSE Manager 2.1:spacewalk-search-2.1.14.6-0.7.18.noarch", "SUSE Manager 2.1:spacewalk-setup-2.1.14.9-0.7.6.noarch", "SUSE Manager 2.1:spacewalk-setup-jabberd-2.1.0.2-0.7.6.noarch", "SUSE Manager 2.1:spacewalk-sniglets-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-taskomatic-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-utils-2.1.27.12-0.7.25.noarch", "SUSE Manager 2.1:spacewalksd-5.0.14.6-0.7.15.s390x", "SUSE Manager 2.1:struts-1.2.9-162.33.22.noarch", "SUSE Manager 2.1:supportutils-plugin-susemanager-1.0.3-0.5.5.noarch", "SUSE Manager 2.1:supportutils-plugin-susemanager-client-1.0.4-0.5.5.noarch", "SUSE Manager 2.1:suseRegisterInfo-2.1.9-0.7.29.s390x", "SUSE Manager 2.1:susemanager-2.1.17-0.7.11.s390x", "SUSE Manager 2.1:susemanager-client-config_en-pdf-2.1-0.15.24.noarch", "SUSE Manager 2.1:susemanager-install_en-pdf-2.1-0.15.24.noarch", "SUSE Manager 2.1:susemanager-jsp_en-2.1-0.15.23.noarch", "SUSE Manager 2.1:susemanager-manuals_en-2.1-0.15.24.noarch", "SUSE Manager 2.1:susemanager-proxy-quick_en-pdf-2.1-0.15.24.noarch", "SUSE Manager 2.1:susemanager-reference_en-pdf-2.1-0.15.24.noarch", "SUSE Manager 2.1:susemanager-schema-2.1.50.11-0.7.8.noarch", "SUSE Manager 2.1:susemanager-sync-data-2.1.5-0.7.6.noarch", "SUSE Manager 2.1:susemanager-tools-2.1.17-0.7.11.s390x", "SUSE Manager 2.1:susemanager-user_en-pdf-2.1-0.15.24.noarch", "SUSE Manager 2.1:tanukiwrapper-3.2.3-0.10.12.s390x", "SUSE Manager 2.1:yum-3.2.29-0.19.30.s390x", "SUSE Manager 2.1:yum-common-3.2.29-0.19.30.s390x", "SUSE Manager 2.1:zypp-plugin-spacewalk-0.9.8-0.15.51.s390x" ] }, "references": [ { "category": "external", "summary": "CVE-2014-3654", "url": "https://www.suse.com/security/cve/CVE-2014-3654" }, { "category": "external", "summary": "SUSE Bug 902182 for CVE-2014-3654", "url": "https://bugzilla.suse.com/902182" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager 2.1:apache2-mod_wsgi-3.3-5.7.17.s390x", "SUSE Manager 2.1:auditlog-keeper-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:auditlog-keeper-rdbms-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:auditlog-keeper-spacewalk-validator-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:auditlog-keeper-syslog-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:auditlog-keeper-xmlout-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:cobbler-2.2.2-0.54.9.s390x", "SUSE Manager 2.1:google-gson-2.2.4-0.7.52.noarch", "SUSE Manager 2.1:libyaml-0-2-0.1.3-0.10.16.11.s390x", "SUSE Manager 2.1:oracle-config-1.1-0.10.10.16.noarch", "SUSE Manager 2.1:osa-dispatcher-5.11.33.7-0.7.16.noarch", "SUSE Manager 2.1:perl-Class-Singleton-1.4-4.13.38.noarch", "SUSE Manager 2.1:perl-NOCpulse-Object-1.26.13.2-0.7.13.noarch", "SUSE Manager 2.1:perl-Satcon-1.20.2-0.7.6.noarch", "SUSE Manager 2.1:perl-auditlog-keeper-client-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:postgresql91-pltcl-9.1.15-0.3.1.s390x", "SUSE Manager 2.1:pxe-default-image-0.1-0.20.56.noarch", "SUSE Manager 2.1:python-enum34-1.0-0.7.33.s390x", "SUSE Manager 2.1:python-gzipstream-1.10.2.2-0.7.6.s390x", "SUSE Manager 2.1:rhn-custom-info-5.4.22.6-0.7.13.noarch", "SUSE Manager 2.1:rhnlib-2.5.69.6-0.7.6.s390x", "SUSE Manager 2.1:rhnmd-5.3.18.4-0.7.15.noarch", "SUSE Manager 2.1:rhnpush-5.5.71.7-0.7.16.noarch", "SUSE Manager 2.1:sm-ncc-sync-data-2.1.9-0.7.6.noarch", "SUSE Manager 2.1:smdba-1.5.1-0.7.6.s390x", "SUSE Manager 2.1:spacecmd-2.1.25.7-0.7.9.s390x", "SUSE Manager 2.1:spacewalk-admin-2.1.2.4-0.7.6.noarch", "SUSE Manager 2.1:spacewalk-backend-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-app-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-applet-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-config-files-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-config-files-common-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-config-files-tool-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-iss-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-iss-export-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-libs-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-package-push-server-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-server-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-sql-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-sql-oracle-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-sql-postgresql-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-tools-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-xml-export-libs-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-xmlrpc-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-base-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-base-minimal-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-base-minimal-config-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-branding-2.1.33.10-0.7.16.s390x", "SUSE Manager 2.1:spacewalk-certs-tools-2.1.6.5-0.7.10.noarch", "SUSE Manager 2.1:spacewalk-check-2.1.16.6-0.7.9.noarch", "SUSE Manager 2.1:spacewalk-client-setup-2.1.16.6-0.7.9.noarch", "SUSE Manager 2.1:spacewalk-client-tools-2.1.16.6-0.7.9.noarch", "SUSE Manager 2.1:spacewalk-config-2.1.5.4-0.7.15.noarch", "SUSE Manager 2.1:spacewalk-doc-indexes-2.1.2.3-0.7.26.noarch", "SUSE Manager 2.1:spacewalk-grail-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-html-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-java-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-java-config-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-java-lib-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-java-oracle-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-java-postgresql-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-pxt-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-reports-2.1.14.8-0.7.10.noarch", "SUSE Manager 2.1:spacewalk-search-2.1.14.6-0.7.18.noarch", "SUSE Manager 2.1:spacewalk-setup-2.1.14.9-0.7.6.noarch", "SUSE Manager 2.1:spacewalk-setup-jabberd-2.1.0.2-0.7.6.noarch", "SUSE Manager 2.1:spacewalk-sniglets-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-taskomatic-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-utils-2.1.27.12-0.7.25.noarch", "SUSE Manager 2.1:spacewalksd-5.0.14.6-0.7.15.s390x", "SUSE Manager 2.1:struts-1.2.9-162.33.22.noarch", "SUSE Manager 2.1:supportutils-plugin-susemanager-1.0.3-0.5.5.noarch", "SUSE Manager 2.1:supportutils-plugin-susemanager-client-1.0.4-0.5.5.noarch", "SUSE Manager 2.1:suseRegisterInfo-2.1.9-0.7.29.s390x", "SUSE Manager 2.1:susemanager-2.1.17-0.7.11.s390x", "SUSE Manager 2.1:susemanager-client-config_en-pdf-2.1-0.15.24.noarch", "SUSE Manager 2.1:susemanager-install_en-pdf-2.1-0.15.24.noarch", "SUSE Manager 2.1:susemanager-jsp_en-2.1-0.15.23.noarch", "SUSE Manager 2.1:susemanager-manuals_en-2.1-0.15.24.noarch", "SUSE Manager 2.1:susemanager-proxy-quick_en-pdf-2.1-0.15.24.noarch", "SUSE Manager 2.1:susemanager-reference_en-pdf-2.1-0.15.24.noarch", "SUSE Manager 2.1:susemanager-schema-2.1.50.11-0.7.8.noarch", "SUSE Manager 2.1:susemanager-sync-data-2.1.5-0.7.6.noarch", "SUSE Manager 2.1:susemanager-tools-2.1.17-0.7.11.s390x", "SUSE Manager 2.1:susemanager-user_en-pdf-2.1-0.15.24.noarch", "SUSE Manager 2.1:tanukiwrapper-3.2.3-0.10.12.s390x", "SUSE Manager 2.1:yum-3.2.29-0.19.30.s390x", "SUSE Manager 2.1:yum-common-3.2.29-0.19.30.s390x", "SUSE Manager 2.1:zypp-plugin-spacewalk-0.9.8-0.15.51.s390x" ] } ], "threats": [ { "category": "impact", "date": "2015-02-25T20:05:05Z", "details": "moderate" } ], "title": "CVE-2014-3654" }, { "cve": "CVE-2014-7811", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-7811" } ], "notes": [ { "category": "general", "text": "Multiple cross-site scripting (XSS) vulnerabilities in Spacewalk and Red Hat Network (RHN) Satellite before 5.7.0 allow remote authenticated users to inject arbitrary web script or HTML via crafted XML data to the REST API.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager 2.1:apache2-mod_wsgi-3.3-5.7.17.s390x", "SUSE Manager 2.1:auditlog-keeper-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:auditlog-keeper-rdbms-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:auditlog-keeper-spacewalk-validator-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:auditlog-keeper-syslog-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:auditlog-keeper-xmlout-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:cobbler-2.2.2-0.54.9.s390x", "SUSE Manager 2.1:google-gson-2.2.4-0.7.52.noarch", "SUSE Manager 2.1:libyaml-0-2-0.1.3-0.10.16.11.s390x", "SUSE Manager 2.1:oracle-config-1.1-0.10.10.16.noarch", "SUSE Manager 2.1:osa-dispatcher-5.11.33.7-0.7.16.noarch", "SUSE Manager 2.1:perl-Class-Singleton-1.4-4.13.38.noarch", "SUSE Manager 2.1:perl-NOCpulse-Object-1.26.13.2-0.7.13.noarch", "SUSE Manager 2.1:perl-Satcon-1.20.2-0.7.6.noarch", "SUSE Manager 2.1:perl-auditlog-keeper-client-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:postgresql91-pltcl-9.1.15-0.3.1.s390x", "SUSE Manager 2.1:pxe-default-image-0.1-0.20.56.noarch", "SUSE Manager 2.1:python-enum34-1.0-0.7.33.s390x", "SUSE Manager 2.1:python-gzipstream-1.10.2.2-0.7.6.s390x", "SUSE Manager 2.1:rhn-custom-info-5.4.22.6-0.7.13.noarch", "SUSE Manager 2.1:rhnlib-2.5.69.6-0.7.6.s390x", "SUSE Manager 2.1:rhnmd-5.3.18.4-0.7.15.noarch", "SUSE Manager 2.1:rhnpush-5.5.71.7-0.7.16.noarch", "SUSE Manager 2.1:sm-ncc-sync-data-2.1.9-0.7.6.noarch", "SUSE Manager 2.1:smdba-1.5.1-0.7.6.s390x", "SUSE Manager 2.1:spacecmd-2.1.25.7-0.7.9.s390x", "SUSE Manager 2.1:spacewalk-admin-2.1.2.4-0.7.6.noarch", "SUSE Manager 2.1:spacewalk-backend-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-app-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-applet-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-config-files-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-config-files-common-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-config-files-tool-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-iss-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-iss-export-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-libs-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-package-push-server-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-server-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-sql-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-sql-oracle-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-sql-postgresql-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-tools-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-xml-export-libs-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-xmlrpc-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-base-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-base-minimal-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-base-minimal-config-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-branding-2.1.33.10-0.7.16.s390x", "SUSE Manager 2.1:spacewalk-certs-tools-2.1.6.5-0.7.10.noarch", "SUSE Manager 2.1:spacewalk-check-2.1.16.6-0.7.9.noarch", "SUSE Manager 2.1:spacewalk-client-setup-2.1.16.6-0.7.9.noarch", "SUSE Manager 2.1:spacewalk-client-tools-2.1.16.6-0.7.9.noarch", "SUSE Manager 2.1:spacewalk-config-2.1.5.4-0.7.15.noarch", "SUSE Manager 2.1:spacewalk-doc-indexes-2.1.2.3-0.7.26.noarch", "SUSE Manager 2.1:spacewalk-grail-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-html-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-java-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-java-config-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-java-lib-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-java-oracle-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-java-postgresql-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-pxt-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-reports-2.1.14.8-0.7.10.noarch", "SUSE Manager 2.1:spacewalk-search-2.1.14.6-0.7.18.noarch", "SUSE Manager 2.1:spacewalk-setup-2.1.14.9-0.7.6.noarch", "SUSE Manager 2.1:spacewalk-setup-jabberd-2.1.0.2-0.7.6.noarch", "SUSE Manager 2.1:spacewalk-sniglets-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-taskomatic-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-utils-2.1.27.12-0.7.25.noarch", "SUSE Manager 2.1:spacewalksd-5.0.14.6-0.7.15.s390x", "SUSE Manager 2.1:struts-1.2.9-162.33.22.noarch", "SUSE Manager 2.1:supportutils-plugin-susemanager-1.0.3-0.5.5.noarch", "SUSE Manager 2.1:supportutils-plugin-susemanager-client-1.0.4-0.5.5.noarch", "SUSE Manager 2.1:suseRegisterInfo-2.1.9-0.7.29.s390x", "SUSE Manager 2.1:susemanager-2.1.17-0.7.11.s390x", "SUSE Manager 2.1:susemanager-client-config_en-pdf-2.1-0.15.24.noarch", "SUSE Manager 2.1:susemanager-install_en-pdf-2.1-0.15.24.noarch", "SUSE Manager 2.1:susemanager-jsp_en-2.1-0.15.23.noarch", "SUSE Manager 2.1:susemanager-manuals_en-2.1-0.15.24.noarch", "SUSE Manager 2.1:susemanager-proxy-quick_en-pdf-2.1-0.15.24.noarch", "SUSE Manager 2.1:susemanager-reference_en-pdf-2.1-0.15.24.noarch", "SUSE Manager 2.1:susemanager-schema-2.1.50.11-0.7.8.noarch", "SUSE Manager 2.1:susemanager-sync-data-2.1.5-0.7.6.noarch", "SUSE Manager 2.1:susemanager-tools-2.1.17-0.7.11.s390x", "SUSE Manager 2.1:susemanager-user_en-pdf-2.1-0.15.24.noarch", "SUSE Manager 2.1:tanukiwrapper-3.2.3-0.10.12.s390x", "SUSE Manager 2.1:yum-3.2.29-0.19.30.s390x", "SUSE Manager 2.1:yum-common-3.2.29-0.19.30.s390x", "SUSE Manager 2.1:zypp-plugin-spacewalk-0.9.8-0.15.51.s390x" ] }, "references": [ { "category": "external", "summary": "CVE-2014-7811", "url": "https://www.suse.com/security/cve/CVE-2014-7811" }, { "category": "external", "summary": "SUSE Bug 902915 for CVE-2014-7811", "url": "https://bugzilla.suse.com/902915" }, { "category": "external", "summary": "SUSE Bug 912886 for CVE-2014-7811", "url": "https://bugzilla.suse.com/912886" }, { "category": "external", "summary": "SUSE Bug 922740 for CVE-2014-7811", "url": "https://bugzilla.suse.com/922740" }, { "category": "external", "summary": "SUSE Bug 969911 for CVE-2014-7811", "url": "https://bugzilla.suse.com/969911" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager 2.1:apache2-mod_wsgi-3.3-5.7.17.s390x", "SUSE Manager 2.1:auditlog-keeper-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:auditlog-keeper-rdbms-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:auditlog-keeper-spacewalk-validator-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:auditlog-keeper-syslog-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:auditlog-keeper-xmlout-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:cobbler-2.2.2-0.54.9.s390x", "SUSE Manager 2.1:google-gson-2.2.4-0.7.52.noarch", "SUSE Manager 2.1:libyaml-0-2-0.1.3-0.10.16.11.s390x", "SUSE Manager 2.1:oracle-config-1.1-0.10.10.16.noarch", "SUSE Manager 2.1:osa-dispatcher-5.11.33.7-0.7.16.noarch", "SUSE Manager 2.1:perl-Class-Singleton-1.4-4.13.38.noarch", "SUSE Manager 2.1:perl-NOCpulse-Object-1.26.13.2-0.7.13.noarch", "SUSE Manager 2.1:perl-Satcon-1.20.2-0.7.6.noarch", "SUSE Manager 2.1:perl-auditlog-keeper-client-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:postgresql91-pltcl-9.1.15-0.3.1.s390x", "SUSE Manager 2.1:pxe-default-image-0.1-0.20.56.noarch", "SUSE Manager 2.1:python-enum34-1.0-0.7.33.s390x", "SUSE Manager 2.1:python-gzipstream-1.10.2.2-0.7.6.s390x", "SUSE Manager 2.1:rhn-custom-info-5.4.22.6-0.7.13.noarch", "SUSE Manager 2.1:rhnlib-2.5.69.6-0.7.6.s390x", "SUSE Manager 2.1:rhnmd-5.3.18.4-0.7.15.noarch", "SUSE Manager 2.1:rhnpush-5.5.71.7-0.7.16.noarch", "SUSE Manager 2.1:sm-ncc-sync-data-2.1.9-0.7.6.noarch", "SUSE Manager 2.1:smdba-1.5.1-0.7.6.s390x", "SUSE Manager 2.1:spacecmd-2.1.25.7-0.7.9.s390x", "SUSE Manager 2.1:spacewalk-admin-2.1.2.4-0.7.6.noarch", "SUSE Manager 2.1:spacewalk-backend-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-app-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-applet-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-config-files-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-config-files-common-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-config-files-tool-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-iss-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-iss-export-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-libs-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-package-push-server-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-server-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-sql-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-sql-oracle-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-sql-postgresql-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-tools-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-xml-export-libs-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-xmlrpc-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-base-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-base-minimal-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-base-minimal-config-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-branding-2.1.33.10-0.7.16.s390x", "SUSE Manager 2.1:spacewalk-certs-tools-2.1.6.5-0.7.10.noarch", "SUSE Manager 2.1:spacewalk-check-2.1.16.6-0.7.9.noarch", "SUSE Manager 2.1:spacewalk-client-setup-2.1.16.6-0.7.9.noarch", "SUSE Manager 2.1:spacewalk-client-tools-2.1.16.6-0.7.9.noarch", "SUSE Manager 2.1:spacewalk-config-2.1.5.4-0.7.15.noarch", "SUSE Manager 2.1:spacewalk-doc-indexes-2.1.2.3-0.7.26.noarch", "SUSE Manager 2.1:spacewalk-grail-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-html-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-java-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-java-config-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-java-lib-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-java-oracle-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-java-postgresql-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-pxt-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-reports-2.1.14.8-0.7.10.noarch", "SUSE Manager 2.1:spacewalk-search-2.1.14.6-0.7.18.noarch", "SUSE Manager 2.1:spacewalk-setup-2.1.14.9-0.7.6.noarch", "SUSE Manager 2.1:spacewalk-setup-jabberd-2.1.0.2-0.7.6.noarch", "SUSE Manager 2.1:spacewalk-sniglets-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-taskomatic-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-utils-2.1.27.12-0.7.25.noarch", "SUSE Manager 2.1:spacewalksd-5.0.14.6-0.7.15.s390x", "SUSE Manager 2.1:struts-1.2.9-162.33.22.noarch", "SUSE Manager 2.1:supportutils-plugin-susemanager-1.0.3-0.5.5.noarch", "SUSE Manager 2.1:supportutils-plugin-susemanager-client-1.0.4-0.5.5.noarch", "SUSE Manager 2.1:suseRegisterInfo-2.1.9-0.7.29.s390x", "SUSE Manager 2.1:susemanager-2.1.17-0.7.11.s390x", "SUSE Manager 2.1:susemanager-client-config_en-pdf-2.1-0.15.24.noarch", "SUSE Manager 2.1:susemanager-install_en-pdf-2.1-0.15.24.noarch", "SUSE Manager 2.1:susemanager-jsp_en-2.1-0.15.23.noarch", "SUSE Manager 2.1:susemanager-manuals_en-2.1-0.15.24.noarch", "SUSE Manager 2.1:susemanager-proxy-quick_en-pdf-2.1-0.15.24.noarch", "SUSE Manager 2.1:susemanager-reference_en-pdf-2.1-0.15.24.noarch", "SUSE Manager 2.1:susemanager-schema-2.1.50.11-0.7.8.noarch", "SUSE Manager 2.1:susemanager-sync-data-2.1.5-0.7.6.noarch", "SUSE Manager 2.1:susemanager-tools-2.1.17-0.7.11.s390x", "SUSE Manager 2.1:susemanager-user_en-pdf-2.1-0.15.24.noarch", "SUSE Manager 2.1:tanukiwrapper-3.2.3-0.10.12.s390x", "SUSE Manager 2.1:yum-3.2.29-0.19.30.s390x", "SUSE Manager 2.1:yum-common-3.2.29-0.19.30.s390x", "SUSE Manager 2.1:zypp-plugin-spacewalk-0.9.8-0.15.51.s390x" ] } ], "threats": [ { "category": "impact", "date": "2015-02-25T20:05:05Z", "details": "moderate" } ], "title": "CVE-2014-7811" }, { "cve": "CVE-2014-7812", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-7812" } ], "notes": [ { "category": "general", "text": "Cross-site scripting (XSS) vulnerability in Spacewalk and Red Hat Network (RHN) Satellite before 5.7.0 allows remote authenticated users to inject arbitrary web script or HTML via the System Groups field.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager 2.1:apache2-mod_wsgi-3.3-5.7.17.s390x", "SUSE Manager 2.1:auditlog-keeper-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:auditlog-keeper-rdbms-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:auditlog-keeper-spacewalk-validator-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:auditlog-keeper-syslog-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:auditlog-keeper-xmlout-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:cobbler-2.2.2-0.54.9.s390x", "SUSE Manager 2.1:google-gson-2.2.4-0.7.52.noarch", "SUSE Manager 2.1:libyaml-0-2-0.1.3-0.10.16.11.s390x", "SUSE Manager 2.1:oracle-config-1.1-0.10.10.16.noarch", "SUSE Manager 2.1:osa-dispatcher-5.11.33.7-0.7.16.noarch", "SUSE Manager 2.1:perl-Class-Singleton-1.4-4.13.38.noarch", "SUSE Manager 2.1:perl-NOCpulse-Object-1.26.13.2-0.7.13.noarch", "SUSE Manager 2.1:perl-Satcon-1.20.2-0.7.6.noarch", "SUSE Manager 2.1:perl-auditlog-keeper-client-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:postgresql91-pltcl-9.1.15-0.3.1.s390x", "SUSE Manager 2.1:pxe-default-image-0.1-0.20.56.noarch", "SUSE Manager 2.1:python-enum34-1.0-0.7.33.s390x", "SUSE Manager 2.1:python-gzipstream-1.10.2.2-0.7.6.s390x", "SUSE Manager 2.1:rhn-custom-info-5.4.22.6-0.7.13.noarch", "SUSE Manager 2.1:rhnlib-2.5.69.6-0.7.6.s390x", "SUSE Manager 2.1:rhnmd-5.3.18.4-0.7.15.noarch", "SUSE Manager 2.1:rhnpush-5.5.71.7-0.7.16.noarch", "SUSE Manager 2.1:sm-ncc-sync-data-2.1.9-0.7.6.noarch", "SUSE Manager 2.1:smdba-1.5.1-0.7.6.s390x", "SUSE Manager 2.1:spacecmd-2.1.25.7-0.7.9.s390x", "SUSE Manager 2.1:spacewalk-admin-2.1.2.4-0.7.6.noarch", "SUSE Manager 2.1:spacewalk-backend-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-app-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-applet-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-config-files-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-config-files-common-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-config-files-tool-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-iss-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-iss-export-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-libs-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-package-push-server-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-server-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-sql-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-sql-oracle-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-sql-postgresql-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-tools-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-xml-export-libs-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-xmlrpc-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-base-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-base-minimal-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-base-minimal-config-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-branding-2.1.33.10-0.7.16.s390x", "SUSE Manager 2.1:spacewalk-certs-tools-2.1.6.5-0.7.10.noarch", "SUSE Manager 2.1:spacewalk-check-2.1.16.6-0.7.9.noarch", "SUSE Manager 2.1:spacewalk-client-setup-2.1.16.6-0.7.9.noarch", "SUSE Manager 2.1:spacewalk-client-tools-2.1.16.6-0.7.9.noarch", "SUSE Manager 2.1:spacewalk-config-2.1.5.4-0.7.15.noarch", "SUSE Manager 2.1:spacewalk-doc-indexes-2.1.2.3-0.7.26.noarch", "SUSE Manager 2.1:spacewalk-grail-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-html-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-java-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-java-config-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-java-lib-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-java-oracle-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-java-postgresql-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-pxt-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-reports-2.1.14.8-0.7.10.noarch", "SUSE Manager 2.1:spacewalk-search-2.1.14.6-0.7.18.noarch", "SUSE Manager 2.1:spacewalk-setup-2.1.14.9-0.7.6.noarch", "SUSE Manager 2.1:spacewalk-setup-jabberd-2.1.0.2-0.7.6.noarch", "SUSE Manager 2.1:spacewalk-sniglets-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-taskomatic-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-utils-2.1.27.12-0.7.25.noarch", "SUSE Manager 2.1:spacewalksd-5.0.14.6-0.7.15.s390x", "SUSE Manager 2.1:struts-1.2.9-162.33.22.noarch", "SUSE Manager 2.1:supportutils-plugin-susemanager-1.0.3-0.5.5.noarch", "SUSE Manager 2.1:supportutils-plugin-susemanager-client-1.0.4-0.5.5.noarch", "SUSE Manager 2.1:suseRegisterInfo-2.1.9-0.7.29.s390x", "SUSE Manager 2.1:susemanager-2.1.17-0.7.11.s390x", "SUSE Manager 2.1:susemanager-client-config_en-pdf-2.1-0.15.24.noarch", "SUSE Manager 2.1:susemanager-install_en-pdf-2.1-0.15.24.noarch", "SUSE Manager 2.1:susemanager-jsp_en-2.1-0.15.23.noarch", "SUSE Manager 2.1:susemanager-manuals_en-2.1-0.15.24.noarch", "SUSE Manager 2.1:susemanager-proxy-quick_en-pdf-2.1-0.15.24.noarch", "SUSE Manager 2.1:susemanager-reference_en-pdf-2.1-0.15.24.noarch", "SUSE Manager 2.1:susemanager-schema-2.1.50.11-0.7.8.noarch", "SUSE Manager 2.1:susemanager-sync-data-2.1.5-0.7.6.noarch", "SUSE Manager 2.1:susemanager-tools-2.1.17-0.7.11.s390x", "SUSE Manager 2.1:susemanager-user_en-pdf-2.1-0.15.24.noarch", "SUSE Manager 2.1:tanukiwrapper-3.2.3-0.10.12.s390x", "SUSE Manager 2.1:yum-3.2.29-0.19.30.s390x", "SUSE Manager 2.1:yum-common-3.2.29-0.19.30.s390x", "SUSE Manager 2.1:zypp-plugin-spacewalk-0.9.8-0.15.51.s390x" ] }, "references": [ { "category": "external", "summary": "CVE-2014-7812", "url": "https://www.suse.com/security/cve/CVE-2014-7812" }, { "category": "external", "summary": "SUSE Bug 912886 for CVE-2014-7812", "url": "https://bugzilla.suse.com/912886" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager 2.1:apache2-mod_wsgi-3.3-5.7.17.s390x", "SUSE Manager 2.1:auditlog-keeper-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:auditlog-keeper-rdbms-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:auditlog-keeper-spacewalk-validator-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:auditlog-keeper-syslog-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:auditlog-keeper-xmlout-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:cobbler-2.2.2-0.54.9.s390x", "SUSE Manager 2.1:google-gson-2.2.4-0.7.52.noarch", "SUSE Manager 2.1:libyaml-0-2-0.1.3-0.10.16.11.s390x", "SUSE Manager 2.1:oracle-config-1.1-0.10.10.16.noarch", "SUSE Manager 2.1:osa-dispatcher-5.11.33.7-0.7.16.noarch", "SUSE Manager 2.1:perl-Class-Singleton-1.4-4.13.38.noarch", "SUSE Manager 2.1:perl-NOCpulse-Object-1.26.13.2-0.7.13.noarch", "SUSE Manager 2.1:perl-Satcon-1.20.2-0.7.6.noarch", "SUSE Manager 2.1:perl-auditlog-keeper-client-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:postgresql91-pltcl-9.1.15-0.3.1.s390x", "SUSE Manager 2.1:pxe-default-image-0.1-0.20.56.noarch", "SUSE Manager 2.1:python-enum34-1.0-0.7.33.s390x", "SUSE Manager 2.1:python-gzipstream-1.10.2.2-0.7.6.s390x", "SUSE Manager 2.1:rhn-custom-info-5.4.22.6-0.7.13.noarch", "SUSE Manager 2.1:rhnlib-2.5.69.6-0.7.6.s390x", "SUSE Manager 2.1:rhnmd-5.3.18.4-0.7.15.noarch", "SUSE Manager 2.1:rhnpush-5.5.71.7-0.7.16.noarch", "SUSE Manager 2.1:sm-ncc-sync-data-2.1.9-0.7.6.noarch", "SUSE Manager 2.1:smdba-1.5.1-0.7.6.s390x", "SUSE Manager 2.1:spacecmd-2.1.25.7-0.7.9.s390x", "SUSE Manager 2.1:spacewalk-admin-2.1.2.4-0.7.6.noarch", "SUSE Manager 2.1:spacewalk-backend-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-app-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-applet-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-config-files-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-config-files-common-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-config-files-tool-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-iss-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-iss-export-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-libs-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-package-push-server-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-server-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-sql-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-sql-oracle-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-sql-postgresql-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-tools-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-xml-export-libs-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-xmlrpc-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-base-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-base-minimal-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-base-minimal-config-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-branding-2.1.33.10-0.7.16.s390x", "SUSE Manager 2.1:spacewalk-certs-tools-2.1.6.5-0.7.10.noarch", "SUSE Manager 2.1:spacewalk-check-2.1.16.6-0.7.9.noarch", "SUSE Manager 2.1:spacewalk-client-setup-2.1.16.6-0.7.9.noarch", "SUSE Manager 2.1:spacewalk-client-tools-2.1.16.6-0.7.9.noarch", "SUSE Manager 2.1:spacewalk-config-2.1.5.4-0.7.15.noarch", "SUSE Manager 2.1:spacewalk-doc-indexes-2.1.2.3-0.7.26.noarch", "SUSE Manager 2.1:spacewalk-grail-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-html-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-java-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-java-config-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-java-lib-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-java-oracle-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-java-postgresql-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-pxt-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-reports-2.1.14.8-0.7.10.noarch", "SUSE Manager 2.1:spacewalk-search-2.1.14.6-0.7.18.noarch", "SUSE Manager 2.1:spacewalk-setup-2.1.14.9-0.7.6.noarch", "SUSE Manager 2.1:spacewalk-setup-jabberd-2.1.0.2-0.7.6.noarch", "SUSE Manager 2.1:spacewalk-sniglets-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-taskomatic-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-utils-2.1.27.12-0.7.25.noarch", "SUSE Manager 2.1:spacewalksd-5.0.14.6-0.7.15.s390x", "SUSE Manager 2.1:struts-1.2.9-162.33.22.noarch", "SUSE Manager 2.1:supportutils-plugin-susemanager-1.0.3-0.5.5.noarch", "SUSE Manager 2.1:supportutils-plugin-susemanager-client-1.0.4-0.5.5.noarch", "SUSE Manager 2.1:suseRegisterInfo-2.1.9-0.7.29.s390x", "SUSE Manager 2.1:susemanager-2.1.17-0.7.11.s390x", "SUSE Manager 2.1:susemanager-client-config_en-pdf-2.1-0.15.24.noarch", "SUSE Manager 2.1:susemanager-install_en-pdf-2.1-0.15.24.noarch", "SUSE Manager 2.1:susemanager-jsp_en-2.1-0.15.23.noarch", "SUSE Manager 2.1:susemanager-manuals_en-2.1-0.15.24.noarch", "SUSE Manager 2.1:susemanager-proxy-quick_en-pdf-2.1-0.15.24.noarch", "SUSE Manager 2.1:susemanager-reference_en-pdf-2.1-0.15.24.noarch", "SUSE Manager 2.1:susemanager-schema-2.1.50.11-0.7.8.noarch", "SUSE Manager 2.1:susemanager-sync-data-2.1.5-0.7.6.noarch", "SUSE Manager 2.1:susemanager-tools-2.1.17-0.7.11.s390x", "SUSE Manager 2.1:susemanager-user_en-pdf-2.1-0.15.24.noarch", "SUSE Manager 2.1:tanukiwrapper-3.2.3-0.10.12.s390x", "SUSE Manager 2.1:yum-3.2.29-0.19.30.s390x", "SUSE Manager 2.1:yum-common-3.2.29-0.19.30.s390x", "SUSE Manager 2.1:zypp-plugin-spacewalk-0.9.8-0.15.51.s390x" ] } ], "threats": [ { "category": "impact", "date": "2015-02-25T20:05:05Z", "details": "low" } ], "title": "CVE-2014-7812" }, { "cve": "CVE-2014-8583", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-8583" } ], "notes": [ { "category": "general", "text": "mod_wsgi before 4.2.4 for Apache, when creating a daemon process group, does not properly handle when group privileges cannot be dropped, which might allow attackers to gain privileges via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager 2.1:apache2-mod_wsgi-3.3-5.7.17.s390x", "SUSE Manager 2.1:auditlog-keeper-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:auditlog-keeper-rdbms-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:auditlog-keeper-spacewalk-validator-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:auditlog-keeper-syslog-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:auditlog-keeper-xmlout-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:cobbler-2.2.2-0.54.9.s390x", "SUSE Manager 2.1:google-gson-2.2.4-0.7.52.noarch", "SUSE Manager 2.1:libyaml-0-2-0.1.3-0.10.16.11.s390x", "SUSE Manager 2.1:oracle-config-1.1-0.10.10.16.noarch", "SUSE Manager 2.1:osa-dispatcher-5.11.33.7-0.7.16.noarch", "SUSE Manager 2.1:perl-Class-Singleton-1.4-4.13.38.noarch", "SUSE Manager 2.1:perl-NOCpulse-Object-1.26.13.2-0.7.13.noarch", "SUSE Manager 2.1:perl-Satcon-1.20.2-0.7.6.noarch", "SUSE Manager 2.1:perl-auditlog-keeper-client-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:postgresql91-pltcl-9.1.15-0.3.1.s390x", "SUSE Manager 2.1:pxe-default-image-0.1-0.20.56.noarch", "SUSE Manager 2.1:python-enum34-1.0-0.7.33.s390x", "SUSE Manager 2.1:python-gzipstream-1.10.2.2-0.7.6.s390x", "SUSE Manager 2.1:rhn-custom-info-5.4.22.6-0.7.13.noarch", "SUSE Manager 2.1:rhnlib-2.5.69.6-0.7.6.s390x", "SUSE Manager 2.1:rhnmd-5.3.18.4-0.7.15.noarch", "SUSE Manager 2.1:rhnpush-5.5.71.7-0.7.16.noarch", "SUSE Manager 2.1:sm-ncc-sync-data-2.1.9-0.7.6.noarch", "SUSE Manager 2.1:smdba-1.5.1-0.7.6.s390x", "SUSE Manager 2.1:spacecmd-2.1.25.7-0.7.9.s390x", "SUSE Manager 2.1:spacewalk-admin-2.1.2.4-0.7.6.noarch", "SUSE Manager 2.1:spacewalk-backend-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-app-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-applet-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-config-files-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-config-files-common-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-config-files-tool-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-iss-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-iss-export-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-libs-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-package-push-server-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-server-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-sql-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-sql-oracle-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-sql-postgresql-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-tools-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-xml-export-libs-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-xmlrpc-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-base-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-base-minimal-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-base-minimal-config-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-branding-2.1.33.10-0.7.16.s390x", "SUSE Manager 2.1:spacewalk-certs-tools-2.1.6.5-0.7.10.noarch", "SUSE Manager 2.1:spacewalk-check-2.1.16.6-0.7.9.noarch", "SUSE Manager 2.1:spacewalk-client-setup-2.1.16.6-0.7.9.noarch", "SUSE Manager 2.1:spacewalk-client-tools-2.1.16.6-0.7.9.noarch", "SUSE Manager 2.1:spacewalk-config-2.1.5.4-0.7.15.noarch", "SUSE Manager 2.1:spacewalk-doc-indexes-2.1.2.3-0.7.26.noarch", "SUSE Manager 2.1:spacewalk-grail-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-html-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-java-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-java-config-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-java-lib-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-java-oracle-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-java-postgresql-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-pxt-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-reports-2.1.14.8-0.7.10.noarch", "SUSE Manager 2.1:spacewalk-search-2.1.14.6-0.7.18.noarch", "SUSE Manager 2.1:spacewalk-setup-2.1.14.9-0.7.6.noarch", "SUSE Manager 2.1:spacewalk-setup-jabberd-2.1.0.2-0.7.6.noarch", "SUSE Manager 2.1:spacewalk-sniglets-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-taskomatic-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-utils-2.1.27.12-0.7.25.noarch", "SUSE Manager 2.1:spacewalksd-5.0.14.6-0.7.15.s390x", "SUSE Manager 2.1:struts-1.2.9-162.33.22.noarch", "SUSE Manager 2.1:supportutils-plugin-susemanager-1.0.3-0.5.5.noarch", "SUSE Manager 2.1:supportutils-plugin-susemanager-client-1.0.4-0.5.5.noarch", "SUSE Manager 2.1:suseRegisterInfo-2.1.9-0.7.29.s390x", "SUSE Manager 2.1:susemanager-2.1.17-0.7.11.s390x", "SUSE Manager 2.1:susemanager-client-config_en-pdf-2.1-0.15.24.noarch", "SUSE Manager 2.1:susemanager-install_en-pdf-2.1-0.15.24.noarch", "SUSE Manager 2.1:susemanager-jsp_en-2.1-0.15.23.noarch", "SUSE Manager 2.1:susemanager-manuals_en-2.1-0.15.24.noarch", "SUSE Manager 2.1:susemanager-proxy-quick_en-pdf-2.1-0.15.24.noarch", "SUSE Manager 2.1:susemanager-reference_en-pdf-2.1-0.15.24.noarch", "SUSE Manager 2.1:susemanager-schema-2.1.50.11-0.7.8.noarch", "SUSE Manager 2.1:susemanager-sync-data-2.1.5-0.7.6.noarch", "SUSE Manager 2.1:susemanager-tools-2.1.17-0.7.11.s390x", "SUSE Manager 2.1:susemanager-user_en-pdf-2.1-0.15.24.noarch", "SUSE Manager 2.1:tanukiwrapper-3.2.3-0.10.12.s390x", "SUSE Manager 2.1:yum-3.2.29-0.19.30.s390x", "SUSE Manager 2.1:yum-common-3.2.29-0.19.30.s390x", "SUSE Manager 2.1:zypp-plugin-spacewalk-0.9.8-0.15.51.s390x" ] }, "references": [ { "category": "external", "summary": "CVE-2014-8583", "url": "https://www.suse.com/security/cve/CVE-2014-8583" }, { "category": "external", "summary": "SUSE Bug 903961 for CVE-2014-8583", "url": "https://bugzilla.suse.com/903961" }, { "category": "external", "summary": "SUSE Bug 907649 for CVE-2014-8583", "url": "https://bugzilla.suse.com/907649" }, { "category": "external", "summary": "SUSE Bug 983032 for CVE-2014-8583", "url": "https://bugzilla.suse.com/983032" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager 2.1:apache2-mod_wsgi-3.3-5.7.17.s390x", "SUSE Manager 2.1:auditlog-keeper-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:auditlog-keeper-rdbms-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:auditlog-keeper-spacewalk-validator-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:auditlog-keeper-syslog-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:auditlog-keeper-xmlout-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:cobbler-2.2.2-0.54.9.s390x", "SUSE Manager 2.1:google-gson-2.2.4-0.7.52.noarch", "SUSE Manager 2.1:libyaml-0-2-0.1.3-0.10.16.11.s390x", "SUSE Manager 2.1:oracle-config-1.1-0.10.10.16.noarch", "SUSE Manager 2.1:osa-dispatcher-5.11.33.7-0.7.16.noarch", "SUSE Manager 2.1:perl-Class-Singleton-1.4-4.13.38.noarch", "SUSE Manager 2.1:perl-NOCpulse-Object-1.26.13.2-0.7.13.noarch", "SUSE Manager 2.1:perl-Satcon-1.20.2-0.7.6.noarch", "SUSE Manager 2.1:perl-auditlog-keeper-client-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:postgresql91-pltcl-9.1.15-0.3.1.s390x", "SUSE Manager 2.1:pxe-default-image-0.1-0.20.56.noarch", "SUSE Manager 2.1:python-enum34-1.0-0.7.33.s390x", "SUSE Manager 2.1:python-gzipstream-1.10.2.2-0.7.6.s390x", "SUSE Manager 2.1:rhn-custom-info-5.4.22.6-0.7.13.noarch", "SUSE Manager 2.1:rhnlib-2.5.69.6-0.7.6.s390x", "SUSE Manager 2.1:rhnmd-5.3.18.4-0.7.15.noarch", "SUSE Manager 2.1:rhnpush-5.5.71.7-0.7.16.noarch", "SUSE Manager 2.1:sm-ncc-sync-data-2.1.9-0.7.6.noarch", "SUSE Manager 2.1:smdba-1.5.1-0.7.6.s390x", "SUSE Manager 2.1:spacecmd-2.1.25.7-0.7.9.s390x", "SUSE Manager 2.1:spacewalk-admin-2.1.2.4-0.7.6.noarch", "SUSE Manager 2.1:spacewalk-backend-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-app-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-applet-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-config-files-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-config-files-common-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-config-files-tool-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-iss-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-iss-export-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-libs-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-package-push-server-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-server-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-sql-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-sql-oracle-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-sql-postgresql-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-tools-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-xml-export-libs-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-xmlrpc-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-base-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-base-minimal-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-base-minimal-config-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-branding-2.1.33.10-0.7.16.s390x", "SUSE Manager 2.1:spacewalk-certs-tools-2.1.6.5-0.7.10.noarch", "SUSE Manager 2.1:spacewalk-check-2.1.16.6-0.7.9.noarch", "SUSE Manager 2.1:spacewalk-client-setup-2.1.16.6-0.7.9.noarch", "SUSE Manager 2.1:spacewalk-client-tools-2.1.16.6-0.7.9.noarch", "SUSE Manager 2.1:spacewalk-config-2.1.5.4-0.7.15.noarch", "SUSE Manager 2.1:spacewalk-doc-indexes-2.1.2.3-0.7.26.noarch", "SUSE Manager 2.1:spacewalk-grail-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-html-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-java-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-java-config-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-java-lib-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-java-oracle-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-java-postgresql-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-pxt-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-reports-2.1.14.8-0.7.10.noarch", "SUSE Manager 2.1:spacewalk-search-2.1.14.6-0.7.18.noarch", "SUSE Manager 2.1:spacewalk-setup-2.1.14.9-0.7.6.noarch", "SUSE Manager 2.1:spacewalk-setup-jabberd-2.1.0.2-0.7.6.noarch", "SUSE Manager 2.1:spacewalk-sniglets-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-taskomatic-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-utils-2.1.27.12-0.7.25.noarch", "SUSE Manager 2.1:spacewalksd-5.0.14.6-0.7.15.s390x", "SUSE Manager 2.1:struts-1.2.9-162.33.22.noarch", "SUSE Manager 2.1:supportutils-plugin-susemanager-1.0.3-0.5.5.noarch", "SUSE Manager 2.1:supportutils-plugin-susemanager-client-1.0.4-0.5.5.noarch", "SUSE Manager 2.1:suseRegisterInfo-2.1.9-0.7.29.s390x", "SUSE Manager 2.1:susemanager-2.1.17-0.7.11.s390x", "SUSE Manager 2.1:susemanager-client-config_en-pdf-2.1-0.15.24.noarch", "SUSE Manager 2.1:susemanager-install_en-pdf-2.1-0.15.24.noarch", "SUSE Manager 2.1:susemanager-jsp_en-2.1-0.15.23.noarch", "SUSE Manager 2.1:susemanager-manuals_en-2.1-0.15.24.noarch", "SUSE Manager 2.1:susemanager-proxy-quick_en-pdf-2.1-0.15.24.noarch", "SUSE Manager 2.1:susemanager-reference_en-pdf-2.1-0.15.24.noarch", "SUSE Manager 2.1:susemanager-schema-2.1.50.11-0.7.8.noarch", "SUSE Manager 2.1:susemanager-sync-data-2.1.5-0.7.6.noarch", "SUSE Manager 2.1:susemanager-tools-2.1.17-0.7.11.s390x", "SUSE Manager 2.1:susemanager-user_en-pdf-2.1-0.15.24.noarch", "SUSE Manager 2.1:tanukiwrapper-3.2.3-0.10.12.s390x", "SUSE Manager 2.1:yum-3.2.29-0.19.30.s390x", "SUSE Manager 2.1:yum-common-3.2.29-0.19.30.s390x", "SUSE Manager 2.1:zypp-plugin-spacewalk-0.9.8-0.15.51.s390x" ] } ], "threats": [ { "category": "impact", "date": "2015-02-25T20:05:05Z", "details": "moderate" } ], "title": "CVE-2014-8583" }, { "cve": "CVE-2014-9130", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9130" } ], "notes": [ { "category": "general", "text": "scanner.c in LibYAML 0.1.5 and 0.1.6, as used in the YAML-LibYAML (aka YAML-XS) module for Perl, allows context-dependent attackers to cause a denial of service (assertion failure and crash) via vectors involving line-wrapping.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager 2.1:apache2-mod_wsgi-3.3-5.7.17.s390x", "SUSE Manager 2.1:auditlog-keeper-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:auditlog-keeper-rdbms-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:auditlog-keeper-spacewalk-validator-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:auditlog-keeper-syslog-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:auditlog-keeper-xmlout-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:cobbler-2.2.2-0.54.9.s390x", "SUSE Manager 2.1:google-gson-2.2.4-0.7.52.noarch", "SUSE Manager 2.1:libyaml-0-2-0.1.3-0.10.16.11.s390x", "SUSE Manager 2.1:oracle-config-1.1-0.10.10.16.noarch", "SUSE Manager 2.1:osa-dispatcher-5.11.33.7-0.7.16.noarch", "SUSE Manager 2.1:perl-Class-Singleton-1.4-4.13.38.noarch", "SUSE Manager 2.1:perl-NOCpulse-Object-1.26.13.2-0.7.13.noarch", "SUSE Manager 2.1:perl-Satcon-1.20.2-0.7.6.noarch", "SUSE Manager 2.1:perl-auditlog-keeper-client-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:postgresql91-pltcl-9.1.15-0.3.1.s390x", "SUSE Manager 2.1:pxe-default-image-0.1-0.20.56.noarch", "SUSE Manager 2.1:python-enum34-1.0-0.7.33.s390x", "SUSE Manager 2.1:python-gzipstream-1.10.2.2-0.7.6.s390x", "SUSE Manager 2.1:rhn-custom-info-5.4.22.6-0.7.13.noarch", "SUSE Manager 2.1:rhnlib-2.5.69.6-0.7.6.s390x", "SUSE Manager 2.1:rhnmd-5.3.18.4-0.7.15.noarch", "SUSE Manager 2.1:rhnpush-5.5.71.7-0.7.16.noarch", "SUSE Manager 2.1:sm-ncc-sync-data-2.1.9-0.7.6.noarch", "SUSE Manager 2.1:smdba-1.5.1-0.7.6.s390x", "SUSE Manager 2.1:spacecmd-2.1.25.7-0.7.9.s390x", "SUSE Manager 2.1:spacewalk-admin-2.1.2.4-0.7.6.noarch", "SUSE Manager 2.1:spacewalk-backend-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-app-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-applet-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-config-files-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-config-files-common-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-config-files-tool-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-iss-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-iss-export-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-libs-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-package-push-server-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-server-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-sql-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-sql-oracle-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-sql-postgresql-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-tools-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-xml-export-libs-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-xmlrpc-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-base-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-base-minimal-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-base-minimal-config-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-branding-2.1.33.10-0.7.16.s390x", "SUSE Manager 2.1:spacewalk-certs-tools-2.1.6.5-0.7.10.noarch", "SUSE Manager 2.1:spacewalk-check-2.1.16.6-0.7.9.noarch", "SUSE Manager 2.1:spacewalk-client-setup-2.1.16.6-0.7.9.noarch", "SUSE Manager 2.1:spacewalk-client-tools-2.1.16.6-0.7.9.noarch", "SUSE Manager 2.1:spacewalk-config-2.1.5.4-0.7.15.noarch", "SUSE Manager 2.1:spacewalk-doc-indexes-2.1.2.3-0.7.26.noarch", "SUSE Manager 2.1:spacewalk-grail-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-html-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-java-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-java-config-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-java-lib-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-java-oracle-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-java-postgresql-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-pxt-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-reports-2.1.14.8-0.7.10.noarch", "SUSE Manager 2.1:spacewalk-search-2.1.14.6-0.7.18.noarch", "SUSE Manager 2.1:spacewalk-setup-2.1.14.9-0.7.6.noarch", "SUSE Manager 2.1:spacewalk-setup-jabberd-2.1.0.2-0.7.6.noarch", "SUSE Manager 2.1:spacewalk-sniglets-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-taskomatic-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-utils-2.1.27.12-0.7.25.noarch", "SUSE Manager 2.1:spacewalksd-5.0.14.6-0.7.15.s390x", "SUSE Manager 2.1:struts-1.2.9-162.33.22.noarch", "SUSE Manager 2.1:supportutils-plugin-susemanager-1.0.3-0.5.5.noarch", "SUSE Manager 2.1:supportutils-plugin-susemanager-client-1.0.4-0.5.5.noarch", "SUSE Manager 2.1:suseRegisterInfo-2.1.9-0.7.29.s390x", "SUSE Manager 2.1:susemanager-2.1.17-0.7.11.s390x", "SUSE Manager 2.1:susemanager-client-config_en-pdf-2.1-0.15.24.noarch", "SUSE Manager 2.1:susemanager-install_en-pdf-2.1-0.15.24.noarch", "SUSE Manager 2.1:susemanager-jsp_en-2.1-0.15.23.noarch", "SUSE Manager 2.1:susemanager-manuals_en-2.1-0.15.24.noarch", "SUSE Manager 2.1:susemanager-proxy-quick_en-pdf-2.1-0.15.24.noarch", "SUSE Manager 2.1:susemanager-reference_en-pdf-2.1-0.15.24.noarch", "SUSE Manager 2.1:susemanager-schema-2.1.50.11-0.7.8.noarch", "SUSE Manager 2.1:susemanager-sync-data-2.1.5-0.7.6.noarch", "SUSE Manager 2.1:susemanager-tools-2.1.17-0.7.11.s390x", "SUSE Manager 2.1:susemanager-user_en-pdf-2.1-0.15.24.noarch", "SUSE Manager 2.1:tanukiwrapper-3.2.3-0.10.12.s390x", "SUSE Manager 2.1:yum-3.2.29-0.19.30.s390x", "SUSE Manager 2.1:yum-common-3.2.29-0.19.30.s390x", "SUSE Manager 2.1:zypp-plugin-spacewalk-0.9.8-0.15.51.s390x" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9130", "url": "https://www.suse.com/security/cve/CVE-2014-9130" }, { "category": "external", "summary": "SUSE Bug 907809 for CVE-2014-9130", "url": "https://bugzilla.suse.com/907809" }, { "category": "external", "summary": "SUSE Bug 911782 for CVE-2014-9130", "url": "https://bugzilla.suse.com/911782" }, { "category": "external", "summary": "SUSE Bug 921588 for CVE-2014-9130", "url": "https://bugzilla.suse.com/921588" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager 2.1:apache2-mod_wsgi-3.3-5.7.17.s390x", "SUSE Manager 2.1:auditlog-keeper-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:auditlog-keeper-rdbms-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:auditlog-keeper-spacewalk-validator-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:auditlog-keeper-syslog-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:auditlog-keeper-xmlout-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:cobbler-2.2.2-0.54.9.s390x", "SUSE Manager 2.1:google-gson-2.2.4-0.7.52.noarch", "SUSE Manager 2.1:libyaml-0-2-0.1.3-0.10.16.11.s390x", "SUSE Manager 2.1:oracle-config-1.1-0.10.10.16.noarch", "SUSE Manager 2.1:osa-dispatcher-5.11.33.7-0.7.16.noarch", "SUSE Manager 2.1:perl-Class-Singleton-1.4-4.13.38.noarch", "SUSE Manager 2.1:perl-NOCpulse-Object-1.26.13.2-0.7.13.noarch", "SUSE Manager 2.1:perl-Satcon-1.20.2-0.7.6.noarch", "SUSE Manager 2.1:perl-auditlog-keeper-client-0.2.3+git.1417708457.eabd1a9-0.7.58.noarch", "SUSE Manager 2.1:postgresql91-pltcl-9.1.15-0.3.1.s390x", "SUSE Manager 2.1:pxe-default-image-0.1-0.20.56.noarch", "SUSE Manager 2.1:python-enum34-1.0-0.7.33.s390x", "SUSE Manager 2.1:python-gzipstream-1.10.2.2-0.7.6.s390x", "SUSE Manager 2.1:rhn-custom-info-5.4.22.6-0.7.13.noarch", "SUSE Manager 2.1:rhnlib-2.5.69.6-0.7.6.s390x", "SUSE Manager 2.1:rhnmd-5.3.18.4-0.7.15.noarch", "SUSE Manager 2.1:rhnpush-5.5.71.7-0.7.16.noarch", "SUSE Manager 2.1:sm-ncc-sync-data-2.1.9-0.7.6.noarch", "SUSE Manager 2.1:smdba-1.5.1-0.7.6.s390x", "SUSE Manager 2.1:spacecmd-2.1.25.7-0.7.9.s390x", "SUSE Manager 2.1:spacewalk-admin-2.1.2.4-0.7.6.noarch", "SUSE Manager 2.1:spacewalk-backend-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-app-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-applet-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-config-files-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-config-files-common-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-config-files-tool-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-iss-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-iss-export-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-libs-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-package-push-server-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-server-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-sql-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-sql-oracle-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-sql-postgresql-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-tools-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-xml-export-libs-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-backend-xmlrpc-2.1.55.15-0.7.11.s390x", "SUSE Manager 2.1:spacewalk-base-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-base-minimal-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-base-minimal-config-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-branding-2.1.33.10-0.7.16.s390x", "SUSE Manager 2.1:spacewalk-certs-tools-2.1.6.5-0.7.10.noarch", "SUSE Manager 2.1:spacewalk-check-2.1.16.6-0.7.9.noarch", "SUSE Manager 2.1:spacewalk-client-setup-2.1.16.6-0.7.9.noarch", "SUSE Manager 2.1:spacewalk-client-tools-2.1.16.6-0.7.9.noarch", "SUSE Manager 2.1:spacewalk-config-2.1.5.4-0.7.15.noarch", "SUSE Manager 2.1:spacewalk-doc-indexes-2.1.2.3-0.7.26.noarch", "SUSE Manager 2.1:spacewalk-grail-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-html-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-java-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-java-config-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-java-lib-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-java-oracle-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-java-postgresql-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-pxt-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-reports-2.1.14.8-0.7.10.noarch", "SUSE Manager 2.1:spacewalk-search-2.1.14.6-0.7.18.noarch", "SUSE Manager 2.1:spacewalk-setup-2.1.14.9-0.7.6.noarch", "SUSE Manager 2.1:spacewalk-setup-jabberd-2.1.0.2-0.7.6.noarch", "SUSE Manager 2.1:spacewalk-sniglets-2.1.60.12-0.7.7.noarch", "SUSE Manager 2.1:spacewalk-taskomatic-2.1.165.14-0.7.16.noarch", "SUSE Manager 2.1:spacewalk-utils-2.1.27.12-0.7.25.noarch", "SUSE Manager 2.1:spacewalksd-5.0.14.6-0.7.15.s390x", "SUSE Manager 2.1:struts-1.2.9-162.33.22.noarch", "SUSE Manager 2.1:supportutils-plugin-susemanager-1.0.3-0.5.5.noarch", "SUSE Manager 2.1:supportutils-plugin-susemanager-client-1.0.4-0.5.5.noarch", "SUSE Manager 2.1:suseRegisterInfo-2.1.9-0.7.29.s390x", "SUSE Manager 2.1:susemanager-2.1.17-0.7.11.s390x", "SUSE Manager 2.1:susemanager-client-config_en-pdf-2.1-0.15.24.noarch", "SUSE Manager 2.1:susemanager-install_en-pdf-2.1-0.15.24.noarch", "SUSE Manager 2.1:susemanager-jsp_en-2.1-0.15.23.noarch", "SUSE Manager 2.1:susemanager-manuals_en-2.1-0.15.24.noarch", "SUSE Manager 2.1:susemanager-proxy-quick_en-pdf-2.1-0.15.24.noarch", "SUSE Manager 2.1:susemanager-reference_en-pdf-2.1-0.15.24.noarch", "SUSE Manager 2.1:susemanager-schema-2.1.50.11-0.7.8.noarch", "SUSE Manager 2.1:susemanager-sync-data-2.1.5-0.7.6.noarch", "SUSE Manager 2.1:susemanager-tools-2.1.17-0.7.11.s390x", "SUSE Manager 2.1:susemanager-user_en-pdf-2.1-0.15.24.noarch", "SUSE Manager 2.1:tanukiwrapper-3.2.3-0.10.12.s390x", "SUSE Manager 2.1:yum-3.2.29-0.19.30.s390x", "SUSE Manager 2.1:yum-common-3.2.29-0.19.30.s390x", "SUSE Manager 2.1:zypp-plugin-spacewalk-0.9.8-0.15.51.s390x" ] } ], "threats": [ { "category": "impact", "date": "2015-02-25T20:05:05Z", "details": "moderate" } ], "title": "CVE-2014-9130" } ] }
suse-su-2015:0699-1
Vulnerability from csaf_suse
Published
2015-03-12 09:33
Modified
2015-03-12 09:33
Summary
Security update for python-PyYAML
Notes
Title of the patch
Security update for python-PyYAML
Description of the patch
python-PyYAML was updated to fix one security issue which could have
allowed an attacker to cause a denial of service by supplying specially
crafted strings. (CVE-2014-9130, bsc#921588)
Security Issues:
* CVE-2014-9130
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9130>
Patchnames
sleclo40sp3-python-PyYAML,sleclo50sp3-python-PyYAML
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for python-PyYAML", "title": "Title of the patch" }, { "category": "description", "text": "\npython-PyYAML was updated to fix one security issue which could have \nallowed an attacker to cause a denial of service by supplying specially \ncrafted strings. (CVE-2014-9130, bsc#921588)\n\nSecurity Issues:\n\n * CVE-2014-9130\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9130\u003e\n\n", "title": "Description of the patch" }, { "category": "details", "text": "sleclo40sp3-python-PyYAML,sleclo50sp3-python-PyYAML", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2015_0699-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2015:0699-1", "url": "https://www.suse.com/support/update/announcement/2015/suse-su-20150699-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2015:0699-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2015-April/001341.html" }, { "category": "self", "summary": "SUSE Bug 921588", "url": "https://bugzilla.suse.com/921588" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9130 page", "url": "https://www.suse.com/security/cve/CVE-2014-9130/" } ], "title": "Security update for python-PyYAML", "tracking": { "current_release_date": "2015-03-12T09:33:36Z", "generator": { "date": "2015-03-12T09:33:36Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2015:0699-1", "initial_release_date": "2015-03-12T09:33:36Z", "revision_history": [ { "date": "2015-03-12T09:33:36Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "python-PyYAML-3.10-0.15.1.x86_64", "product": { "name": "python-PyYAML-3.10-0.15.1.x86_64", "product_id": "python-PyYAML-3.10-0.15.1.x86_64" } }, { "category": "product_version", "name": "python-PyYAML-3.10-0.13.1.x86_64", "product": { "name": "python-PyYAML-3.10-0.13.1.x86_64", "product_id": "python-PyYAML-3.10-0.13.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE OpenStack Cloud 4", "product": { "name": "SUSE OpenStack Cloud 4", "product_id": "SUSE OpenStack Cloud 4", "product_identification_helper": { "cpe": "cpe:/o:suse:cloud:4" } } }, { "category": "product_name", "name": "SUSE OpenStack Cloud 5", "product": { "name": "SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5", "product_identification_helper": { "cpe": "cpe:/o:suse:cloud:5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "python-PyYAML-3.10-0.15.1.x86_64 as component of SUSE OpenStack Cloud 4", "product_id": "SUSE OpenStack Cloud 4:python-PyYAML-3.10-0.15.1.x86_64" }, "product_reference": "python-PyYAML-3.10-0.15.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 4" }, { "category": "default_component_of", "full_product_name": { "name": "python-PyYAML-3.10-0.13.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:python-PyYAML-3.10-0.13.1.x86_64" }, "product_reference": "python-PyYAML-3.10-0.13.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" } ] }, "vulnerabilities": [ { "cve": "CVE-2014-9130", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9130" } ], "notes": [ { "category": "general", "text": "scanner.c in LibYAML 0.1.5 and 0.1.6, as used in the YAML-LibYAML (aka YAML-XS) module for Perl, allows context-dependent attackers to cause a denial of service (assertion failure and crash) via vectors involving line-wrapping.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE OpenStack Cloud 4:python-PyYAML-3.10-0.15.1.x86_64", "SUSE OpenStack Cloud 5:python-PyYAML-3.10-0.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9130", "url": "https://www.suse.com/security/cve/CVE-2014-9130" }, { "category": "external", "summary": "SUSE Bug 907809 for CVE-2014-9130", "url": "https://bugzilla.suse.com/907809" }, { "category": "external", "summary": "SUSE Bug 911782 for CVE-2014-9130", "url": "https://bugzilla.suse.com/911782" }, { "category": "external", "summary": "SUSE Bug 921588 for CVE-2014-9130", "url": "https://bugzilla.suse.com/921588" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE OpenStack Cloud 4:python-PyYAML-3.10-0.15.1.x86_64", "SUSE OpenStack Cloud 5:python-PyYAML-3.10-0.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-03-12T09:33:36Z", "details": "moderate" } ], "title": "CVE-2014-9130" } ] }
suse-su-2015:0925-1
Vulnerability from csaf_suse
Published
2015-03-12 10:18
Modified
2015-03-12 10:18
Summary
Security update for python-PyYAML
Notes
Title of the patch
Security update for python-PyYAML
Description of the patch
python-PyYAML was updated to fix one security issue which could have allowed an attacker to cause a denial of service by supplying specially crafted strings
The following issue was fixed:
- #921588: python-PyYAML: assert failure when processing wrapped strings (equivalent to CVE-2014-9130 in LibYAML)
Patchnames
SUSE-SLE-HA-12-2015-208,SUSE-SLE-Module-Public-Cloud-12-2015-208
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for python-PyYAML", "title": "Title of the patch" }, { "category": "description", "text": "python-PyYAML was updated to fix one security issue which could have allowed an attacker to cause a denial of service by supplying specially crafted strings\n\nThe following issue was fixed:\n- #921588: python-PyYAML: assert failure when processing wrapped strings (equivalent to CVE-2014-9130 in LibYAML) \n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-HA-12-2015-208,SUSE-SLE-Module-Public-Cloud-12-2015-208", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2015_0925-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2015:0925-1", "url": "https://www.suse.com/support/update/announcement/2015/suse-su-20150925-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2015:0925-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2015-May/001399.html" }, { "category": "self", "summary": "SUSE Bug 921588", "url": "https://bugzilla.suse.com/921588" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9130 page", "url": "https://www.suse.com/security/cve/CVE-2014-9130/" } ], "title": "Security update for python-PyYAML", "tracking": { "current_release_date": "2015-03-12T10:18:36Z", "generator": { "date": "2015-03-12T10:18:36Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2015:0925-1", "initial_release_date": "2015-03-12T10:18:36Z", "revision_history": [ { "date": "2015-03-12T10:18:36Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "python-PyYAML-3.10-15.1.ppc64le", "product": { "name": "python-PyYAML-3.10-15.1.ppc64le", "product_id": "python-PyYAML-3.10-15.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "python-PyYAML-3.10-15.1.s390x", "product": { "name": "python-PyYAML-3.10-15.1.s390x", "product_id": "python-PyYAML-3.10-15.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "python-PyYAML-3.10-15.1.x86_64", "product": { "name": "python-PyYAML-3.10-15.1.x86_64", "product_id": "python-PyYAML-3.10-15.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 12", "product": { "name": "SUSE Linux Enterprise High Availability Extension 12", "product_id": "SUSE Linux Enterprise High Availability Extension 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Public Cloud 12", "product": { "name": "SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-public-cloud:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "python-PyYAML-3.10-15.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12", "product_id": "SUSE Linux Enterprise High Availability Extension 12:python-PyYAML-3.10-15.1.s390x" }, "product_reference": "python-PyYAML-3.10-15.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12" }, { "category": "default_component_of", "full_product_name": { "name": "python-PyYAML-3.10-15.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12", "product_id": "SUSE Linux Enterprise High Availability Extension 12:python-PyYAML-3.10-15.1.x86_64" }, "product_reference": "python-PyYAML-3.10-15.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12" }, { "category": "default_component_of", "full_product_name": { "name": "python-PyYAML-3.10-15.1.ppc64le as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:python-PyYAML-3.10-15.1.ppc64le" }, "product_reference": "python-PyYAML-3.10-15.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "python-PyYAML-3.10-15.1.s390x as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:python-PyYAML-3.10-15.1.s390x" }, "product_reference": "python-PyYAML-3.10-15.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "python-PyYAML-3.10-15.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:python-PyYAML-3.10-15.1.x86_64" }, "product_reference": "python-PyYAML-3.10-15.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2014-9130", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9130" } ], "notes": [ { "category": "general", "text": "scanner.c in LibYAML 0.1.5 and 0.1.6, as used in the YAML-LibYAML (aka YAML-XS) module for Perl, allows context-dependent attackers to cause a denial of service (assertion failure and crash) via vectors involving line-wrapping.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12:python-PyYAML-3.10-15.1.s390x", "SUSE Linux Enterprise High Availability Extension 12:python-PyYAML-3.10-15.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:python-PyYAML-3.10-15.1.ppc64le", "SUSE Linux Enterprise Module for Public Cloud 12:python-PyYAML-3.10-15.1.s390x", "SUSE Linux Enterprise Module for Public Cloud 12:python-PyYAML-3.10-15.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9130", "url": "https://www.suse.com/security/cve/CVE-2014-9130" }, { "category": "external", "summary": "SUSE Bug 907809 for CVE-2014-9130", "url": "https://bugzilla.suse.com/907809" }, { "category": "external", "summary": "SUSE Bug 911782 for CVE-2014-9130", "url": "https://bugzilla.suse.com/911782" }, { "category": "external", "summary": "SUSE Bug 921588 for CVE-2014-9130", "url": "https://bugzilla.suse.com/921588" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12:python-PyYAML-3.10-15.1.s390x", "SUSE Linux Enterprise High Availability Extension 12:python-PyYAML-3.10-15.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:python-PyYAML-3.10-15.1.ppc64le", "SUSE Linux Enterprise Module for Public Cloud 12:python-PyYAML-3.10-15.1.s390x", "SUSE Linux Enterprise Module for Public Cloud 12:python-PyYAML-3.10-15.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-03-12T10:18:36Z", "details": "moderate" } ], "title": "CVE-2014-9130" } ] }
suse-su-2015:0925-2
Vulnerability from csaf_suse
Published
2015-03-12 10:18
Modified
2015-03-12 10:18
Summary
Security update for python-PyYAML
Notes
Title of the patch
Security update for python-PyYAML
Description of the patch
python-PyYAML was updated to fix one security issue which could have allowed an attacker to cause a denial of service by supplying specially crafted strings
The following issue was fixed:
- #921588: python-PyYAML: assert failure when processing wrapped strings (equivalent to CVE-2014-9130 in LibYAML)
Patchnames
SUSE-SLE12-CLOUD-5-2015-208,SUSE-Storage-1.0-2015-208
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for python-PyYAML", "title": "Title of the patch" }, { "category": "description", "text": "python-PyYAML was updated to fix one security issue which could have allowed an attacker to cause a denial of service by supplying specially crafted strings\n\nThe following issue was fixed:\n- #921588: python-PyYAML: assert failure when processing wrapped strings (equivalent to CVE-2014-9130 in LibYAML) \n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE12-CLOUD-5-2015-208,SUSE-Storage-1.0-2015-208", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2015_0925-2.json" }, { "category": "self", "summary": "URL for SUSE-SU-2015:0925-2", "url": "https://www.suse.com/support/update/announcement/2015/suse-su-20150925-2/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2015:0925-2", "url": "https://lists.suse.com/pipermail/sle-security-updates/2015-June/001449.html" }, { "category": "self", "summary": "SUSE Bug 921588", "url": "https://bugzilla.suse.com/921588" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9130 page", "url": "https://www.suse.com/security/cve/CVE-2014-9130/" } ], "title": "Security update for python-PyYAML", "tracking": { "current_release_date": "2015-03-12T10:18:35Z", "generator": { "date": "2015-03-12T10:18:35Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2015:0925-2", "initial_release_date": "2015-03-12T10:18:35Z", "revision_history": [ { "date": "2015-03-12T10:18:35Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "python-PyYAML-3.10-15.1.x86_64", "product": { "name": "python-PyYAML-3.10-15.1.x86_64", "product_id": "python-PyYAML-3.10-15.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Cloud Compute Node for SUSE Linux Enterprise 12 5", "product": { "name": "SUSE Cloud Compute Node for SUSE Linux Enterprise 12 5", "product_id": "SUSE Cloud Compute Node for SUSE Linux Enterprise 12 5", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-sle12-cloud-compute:5" } } }, { "category": "product_name", "name": "SUSE Enterprise Storage 1.0", "product": { "name": "SUSE Enterprise Storage 1.0", "product_id": "SUSE Enterprise Storage 1.0", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:1.0" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "python-PyYAML-3.10-15.1.x86_64 as component of SUSE Cloud Compute Node for SUSE Linux Enterprise 12 5", "product_id": "SUSE Cloud Compute Node for SUSE Linux Enterprise 12 5:python-PyYAML-3.10-15.1.x86_64" }, "product_reference": "python-PyYAML-3.10-15.1.x86_64", "relates_to_product_reference": "SUSE Cloud Compute Node for SUSE Linux Enterprise 12 5" }, { "category": "default_component_of", "full_product_name": { "name": "python-PyYAML-3.10-15.1.x86_64 as component of SUSE Enterprise Storage 1.0", "product_id": "SUSE Enterprise Storage 1.0:python-PyYAML-3.10-15.1.x86_64" }, "product_reference": "python-PyYAML-3.10-15.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 1.0" } ] }, "vulnerabilities": [ { "cve": "CVE-2014-9130", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9130" } ], "notes": [ { "category": "general", "text": "scanner.c in LibYAML 0.1.5 and 0.1.6, as used in the YAML-LibYAML (aka YAML-XS) module for Perl, allows context-dependent attackers to cause a denial of service (assertion failure and crash) via vectors involving line-wrapping.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Cloud Compute Node for SUSE Linux Enterprise 12 5:python-PyYAML-3.10-15.1.x86_64", "SUSE Enterprise Storage 1.0:python-PyYAML-3.10-15.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9130", "url": "https://www.suse.com/security/cve/CVE-2014-9130" }, { "category": "external", "summary": "SUSE Bug 907809 for CVE-2014-9130", "url": "https://bugzilla.suse.com/907809" }, { "category": "external", "summary": "SUSE Bug 911782 for CVE-2014-9130", "url": "https://bugzilla.suse.com/911782" }, { "category": "external", "summary": "SUSE Bug 921588 for CVE-2014-9130", "url": "https://bugzilla.suse.com/921588" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Cloud Compute Node for SUSE Linux Enterprise 12 5:python-PyYAML-3.10-15.1.x86_64", "SUSE Enterprise Storage 1.0:python-PyYAML-3.10-15.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-03-12T10:18:35Z", "details": "moderate" } ], "title": "CVE-2014-9130" } ] }
wid-sec-w-2025-0271
Vulnerability from csaf_certbund
Published
2015-01-28 23:00
Modified
2025-02-04 23:00
Summary
libyaml: Schwachstelle ermöglicht Denial of Service
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Red Hat Enterprise Linux ist eine Linux-Distribution der Firma Red Hat.
Angriff
Ein entfernter, anonymer Angreifer kann eine Schwachstelle in Red Hat Enterprise Linux Server, Red Hat Enterprise Linux Desktop, Red Hat Enterprise Linux Workstation und Red Hat Enterprise Linux Server EUS ausnutzen, um einen Denial of Service Angriff durchzuführen.
Betroffene Betriebssysteme
- Linux
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Red Hat Enterprise Linux ist eine Linux-Distribution der Firma Red Hat.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann eine Schwachstelle in Red Hat Enterprise Linux Server, Red Hat Enterprise Linux Desktop, Red Hat Enterprise Linux Workstation und Red Hat Enterprise Linux Server EUS ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2025-0271 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2015/wid-sec-w-2025-0271.json" }, { "category": "self", "summary": "WID-SEC-2025-0271 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-0271" }, { "category": "external", "summary": "Red Hat: libyaml security update vom 2015-01-28", "url": "https://rhn.redhat.com/errata/RHSA-2015-0100.html" }, { "category": "external", "summary": "CentOS Errata and Security Advisory CESA-2015:0100 vom 2015-01-28", "url": "http://lists.centos.org/pipermail/centos-announce/2015-January/020909.html" }, { "category": "external", "summary": "CentOS Errata and Security Advisory CESA-2015:0100 vom 2015-01-28", "url": "http://lists.centos.org/pipermail/centos-announce/2015-January/020917.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2014:1699-3 vom 2015-01-29", "url": "https://www.suse.com/support/update/announcement/2015/suse-su-20141699-3.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2015:0112-1 vom 2015-02-02", "url": "http://rhn.redhat.com/errata/RHSA-2015-0112.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2015:0699-1 vom 2015-04-09", "url": "https://www.suse.com/support/update/announcement/2015/suse-su-20150699-1.html" }, { "category": "external", "summary": "Dell Security Advisory DSA-2025-071 vom 2025-02-05", "url": "https://www.dell.com/support/kbdoc/de-de/000281275/dsa-2025-071-security-update-for-dell-avamar-for-multiple-component-vulnerabilities" } ], "source_lang": "en-US", "title": "libyaml: Schwachstelle erm\u00f6glicht Denial of Service", "tracking": { "current_release_date": "2025-02-04T23:00:00.000+00:00", "generator": { "date": "2025-02-05T12:40:14.592+00:00", "engine": { "name": "BSI-WID", "version": "1.3.10" } }, "id": "WID-SEC-W-2025-0271", "initial_release_date": "2015-01-28T23:00:00.000+00:00", "revision_history": [ { "date": "2015-01-28T23:00:00.000+00:00", "number": "1", "summary": "Initial Release" }, { "date": "2015-01-28T23:00:00.000+00:00", "number": "2", "summary": "Version nicht vorhanden" }, { "date": "2015-01-29T23:00:00.000+00:00", "number": "3", "summary": "New remediations available" }, { "date": "2015-01-29T23:00:00.000+00:00", "number": "4", "summary": "Version nicht vorhanden" }, { "date": "2015-01-29T23:00:00.000+00:00", "number": "5", "summary": "Version nicht vorhanden" }, { "date": "2015-01-29T23:00:00.000+00:00", "number": "6", "summary": "New remediations available" }, { "date": "2015-01-29T23:00:00.000+00:00", "number": "7", "summary": "Version nicht vorhanden" }, { "date": "2015-02-02T23:00:00.000+00:00", "number": "8", "summary": "New remediations available" }, { "date": "2015-04-09T22:00:00.000+00:00", "number": "9", "summary": "New remediations available" }, { "date": "2015-04-09T22:00:00.000+00:00", "number": "10", "summary": "Version nicht vorhanden" }, { "date": "2025-02-04T23:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Dell aufgenommen" } ], "status": "final", "version": "11" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c19.12", "product": { "name": "Dell Avamar \u003c19.12", "product_id": "T040818" } }, { "category": "product_version", "name": "19.12", "product": { "name": "Dell Avamar 19.12", "product_id": "T040818-fixed", "product_identification_helper": { "cpe": "cpe:/a:dell:avamar:19.12" } } } ], "category": "product_name", "name": "Avamar" } ], "category": "vendor", "name": "Dell" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "6", "product": { "name": "Open Source CentOS 6", "product_id": "160056", "product_identification_helper": { "cpe": "cpe:/o:centos:centos:6" } } }, { "category": "product_version", "name": "7", "product": { "name": "Open Source CentOS 7", "product_id": "T003633", "product_identification_helper": { "cpe": "cpe:/o:centos:centos:7" } } } ], "category": "product_name", "name": "CentOS" } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "6", "product": { "name": "Red Hat Enterprise Linux Server 6", "product_id": "T000343", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6" } } }, { "category": "product_version", "name": "7", "product": { "name": "Red Hat Enterprise Linux Server 7", "product_id": "T003550", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_version", "name": "6.6.z EUS", "product": { "name": "Red Hat Enterprise Linux Server EUS 6.6.z EUS", "product_id": "T004097", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6.6.z:eus" } } } ], "category": "product_name", "name": "Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "6", "product": { "name": "Red Hat Enterprise Linux Desktop 6", "product_id": "T000223", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux_desktop:6" } } }, { "category": "product_version", "name": "7", "product": { "name": "Red Hat Enterprise Linux Desktop 7", "product_id": "T003551", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux_desktop:7::desktop" } } } ], "category": "product_name", "name": "Enterprise Linux Desktop" }, { "branches": [ { "category": "product_version", "name": "6", "product": { "name": "Red Hat Enterprise Linux Workstation 6", "product_id": "T000396", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux_workstation:6" } } }, { "category": "product_version", "name": "7", "product": { "name": "Red Hat Enterprise Linux Workstation 7", "product_id": "T003565", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux_workstation:7" } } } ], "category": "product_name", "name": "Enterprise Linux Workstation" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2014-9130", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in libyaml. Ein Angreifer kann durch Hochladen einer manipulierten YAML-Datei einen Assertion Fehler ausl\u00f6sen und damit die Server Applikation zum Absturz bringen." } ], "product_status": { "known_affected": [ "T040818", "T003550", "T003551", "T003565", "T003633", "T000223", "T000343", "160056", "T000396", "T004097" ] }, "release_date": "2015-01-28T23:00:00.000+00:00", "title": "CVE-2014-9130" } ] }
opensuse-su-2024:10029-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
libyaml-0-2-0.1.6-4.8 on GA media
Notes
Title of the patch
libyaml-0-2-0.1.6-4.8 on GA media
Description of the patch
These are all security issues fixed in the libyaml-0-2-0.1.6-4.8 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-10029
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "libyaml-0-2-0.1.6-4.8 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the libyaml-0-2-0.1.6-4.8 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-10029", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10029-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6393 page", "url": "https://www.suse.com/security/cve/CVE-2013-6393/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-2525 page", "url": "https://www.suse.com/security/cve/CVE-2014-2525/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9130 page", "url": "https://www.suse.com/security/cve/CVE-2014-9130/" } ], "title": "libyaml-0-2-0.1.6-4.8 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:10029-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "libyaml-0-2-0.1.6-4.8.aarch64", "product": { "name": "libyaml-0-2-0.1.6-4.8.aarch64", "product_id": "libyaml-0-2-0.1.6-4.8.aarch64" } }, { "category": "product_version", "name": "libyaml-devel-0.1.6-4.8.aarch64", "product": { "name": "libyaml-devel-0.1.6-4.8.aarch64", "product_id": "libyaml-devel-0.1.6-4.8.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "libyaml-0-2-0.1.6-4.8.ppc64le", "product": { "name": "libyaml-0-2-0.1.6-4.8.ppc64le", "product_id": "libyaml-0-2-0.1.6-4.8.ppc64le" } }, { "category": "product_version", "name": "libyaml-devel-0.1.6-4.8.ppc64le", "product": { "name": "libyaml-devel-0.1.6-4.8.ppc64le", "product_id": "libyaml-devel-0.1.6-4.8.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "libyaml-0-2-0.1.6-4.8.s390x", "product": { "name": "libyaml-0-2-0.1.6-4.8.s390x", "product_id": "libyaml-0-2-0.1.6-4.8.s390x" } }, { "category": "product_version", "name": "libyaml-devel-0.1.6-4.8.s390x", "product": { "name": "libyaml-devel-0.1.6-4.8.s390x", "product_id": "libyaml-devel-0.1.6-4.8.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "libyaml-0-2-0.1.6-4.8.x86_64", "product": { "name": "libyaml-0-2-0.1.6-4.8.x86_64", "product_id": "libyaml-0-2-0.1.6-4.8.x86_64" } }, { "category": "product_version", "name": "libyaml-devel-0.1.6-4.8.x86_64", "product": { "name": "libyaml-devel-0.1.6-4.8.x86_64", "product_id": "libyaml-devel-0.1.6-4.8.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libyaml-0-2-0.1.6-4.8.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libyaml-0-2-0.1.6-4.8.aarch64" }, "product_reference": "libyaml-0-2-0.1.6-4.8.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0-2-0.1.6-4.8.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libyaml-0-2-0.1.6-4.8.ppc64le" }, "product_reference": "libyaml-0-2-0.1.6-4.8.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0-2-0.1.6-4.8.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libyaml-0-2-0.1.6-4.8.s390x" }, "product_reference": "libyaml-0-2-0.1.6-4.8.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0-2-0.1.6-4.8.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libyaml-0-2-0.1.6-4.8.x86_64" }, "product_reference": "libyaml-0-2-0.1.6-4.8.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0.1.6-4.8.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libyaml-devel-0.1.6-4.8.aarch64" }, "product_reference": "libyaml-devel-0.1.6-4.8.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0.1.6-4.8.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libyaml-devel-0.1.6-4.8.ppc64le" }, "product_reference": "libyaml-devel-0.1.6-4.8.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0.1.6-4.8.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libyaml-devel-0.1.6-4.8.s390x" }, "product_reference": "libyaml-devel-0.1.6-4.8.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0.1.6-4.8.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libyaml-devel-0.1.6-4.8.x86_64" }, "product_reference": "libyaml-devel-0.1.6-4.8.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2013-6393", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6393" } ], "notes": [ { "category": "general", "text": "The yaml_parser_scan_tag_uri function in scanner.c in LibYAML before 0.1.5 performs an incorrect cast, which allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted tags in a YAML document, which triggers a heap-based buffer overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libyaml-0-2-0.1.6-4.8.aarch64", "openSUSE Tumbleweed:libyaml-0-2-0.1.6-4.8.ppc64le", "openSUSE Tumbleweed:libyaml-0-2-0.1.6-4.8.s390x", "openSUSE Tumbleweed:libyaml-0-2-0.1.6-4.8.x86_64", "openSUSE Tumbleweed:libyaml-devel-0.1.6-4.8.aarch64", "openSUSE Tumbleweed:libyaml-devel-0.1.6-4.8.ppc64le", "openSUSE Tumbleweed:libyaml-devel-0.1.6-4.8.s390x", "openSUSE Tumbleweed:libyaml-devel-0.1.6-4.8.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6393", "url": "https://www.suse.com/security/cve/CVE-2013-6393" }, { "category": "external", "summary": "SUSE Bug 860617 for CVE-2013-6393", "url": "https://bugzilla.suse.com/860617" }, { "category": "external", "summary": "SUSE Bug 911782 for CVE-2013-6393", "url": "https://bugzilla.suse.com/911782" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libyaml-0-2-0.1.6-4.8.aarch64", "openSUSE Tumbleweed:libyaml-0-2-0.1.6-4.8.ppc64le", "openSUSE Tumbleweed:libyaml-0-2-0.1.6-4.8.s390x", "openSUSE Tumbleweed:libyaml-0-2-0.1.6-4.8.x86_64", "openSUSE Tumbleweed:libyaml-devel-0.1.6-4.8.aarch64", "openSUSE Tumbleweed:libyaml-devel-0.1.6-4.8.ppc64le", "openSUSE Tumbleweed:libyaml-devel-0.1.6-4.8.s390x", "openSUSE Tumbleweed:libyaml-devel-0.1.6-4.8.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2013-6393" }, { "cve": "CVE-2014-2525", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-2525" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in the yaml_parser_scan_uri_escapes function in LibYAML before 0.1.6 allows context-dependent attackers to execute arbitrary code via a long sequence of percent-encoded characters in a URI in a YAML file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libyaml-0-2-0.1.6-4.8.aarch64", "openSUSE Tumbleweed:libyaml-0-2-0.1.6-4.8.ppc64le", "openSUSE Tumbleweed:libyaml-0-2-0.1.6-4.8.s390x", "openSUSE Tumbleweed:libyaml-0-2-0.1.6-4.8.x86_64", "openSUSE Tumbleweed:libyaml-devel-0.1.6-4.8.aarch64", "openSUSE Tumbleweed:libyaml-devel-0.1.6-4.8.ppc64le", "openSUSE Tumbleweed:libyaml-devel-0.1.6-4.8.s390x", "openSUSE Tumbleweed:libyaml-devel-0.1.6-4.8.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-2525", "url": "https://www.suse.com/security/cve/CVE-2014-2525" }, { "category": "external", "summary": "SUSE Bug 868944 for CVE-2014-2525", "url": "https://bugzilla.suse.com/868944" }, { "category": "external", "summary": "SUSE Bug 911782 for CVE-2014-2525", "url": "https://bugzilla.suse.com/911782" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libyaml-0-2-0.1.6-4.8.aarch64", "openSUSE Tumbleweed:libyaml-0-2-0.1.6-4.8.ppc64le", "openSUSE Tumbleweed:libyaml-0-2-0.1.6-4.8.s390x", "openSUSE Tumbleweed:libyaml-0-2-0.1.6-4.8.x86_64", "openSUSE Tumbleweed:libyaml-devel-0.1.6-4.8.aarch64", "openSUSE Tumbleweed:libyaml-devel-0.1.6-4.8.ppc64le", "openSUSE Tumbleweed:libyaml-devel-0.1.6-4.8.s390x", "openSUSE Tumbleweed:libyaml-devel-0.1.6-4.8.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-2525" }, { "cve": "CVE-2014-9130", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9130" } ], "notes": [ { "category": "general", "text": "scanner.c in LibYAML 0.1.5 and 0.1.6, as used in the YAML-LibYAML (aka YAML-XS) module for Perl, allows context-dependent attackers to cause a denial of service (assertion failure and crash) via vectors involving line-wrapping.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libyaml-0-2-0.1.6-4.8.aarch64", "openSUSE Tumbleweed:libyaml-0-2-0.1.6-4.8.ppc64le", "openSUSE Tumbleweed:libyaml-0-2-0.1.6-4.8.s390x", "openSUSE Tumbleweed:libyaml-0-2-0.1.6-4.8.x86_64", "openSUSE Tumbleweed:libyaml-devel-0.1.6-4.8.aarch64", "openSUSE Tumbleweed:libyaml-devel-0.1.6-4.8.ppc64le", "openSUSE Tumbleweed:libyaml-devel-0.1.6-4.8.s390x", "openSUSE Tumbleweed:libyaml-devel-0.1.6-4.8.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9130", "url": "https://www.suse.com/security/cve/CVE-2014-9130" }, { "category": "external", "summary": "SUSE Bug 907809 for CVE-2014-9130", "url": "https://bugzilla.suse.com/907809" }, { "category": "external", "summary": "SUSE Bug 911782 for CVE-2014-9130", "url": "https://bugzilla.suse.com/911782" }, { "category": "external", "summary": "SUSE Bug 921588 for CVE-2014-9130", "url": "https://bugzilla.suse.com/921588" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libyaml-0-2-0.1.6-4.8.aarch64", "openSUSE Tumbleweed:libyaml-0-2-0.1.6-4.8.ppc64le", "openSUSE Tumbleweed:libyaml-0-2-0.1.6-4.8.s390x", "openSUSE Tumbleweed:libyaml-0-2-0.1.6-4.8.x86_64", "openSUSE Tumbleweed:libyaml-devel-0.1.6-4.8.aarch64", "openSUSE Tumbleweed:libyaml-devel-0.1.6-4.8.ppc64le", "openSUSE Tumbleweed:libyaml-devel-0.1.6-4.8.s390x", "openSUSE Tumbleweed:libyaml-devel-0.1.6-4.8.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-9130" } ] }
opensuse-su-2024:10520-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
perl-YAML-LibYAML-0.59-2.11 on GA media
Notes
Title of the patch
perl-YAML-LibYAML-0.59-2.11 on GA media
Description of the patch
These are all security issues fixed in the perl-YAML-LibYAML-0.59-2.11 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-10520
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "perl-YAML-LibYAML-0.59-2.11 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the perl-YAML-LibYAML-0.59-2.11 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-10520", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10520-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2012-1152 page", "url": "https://www.suse.com/security/cve/CVE-2012-1152/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6393 page", "url": "https://www.suse.com/security/cve/CVE-2013-6393/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-2525 page", "url": "https://www.suse.com/security/cve/CVE-2014-2525/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9130 page", "url": "https://www.suse.com/security/cve/CVE-2014-9130/" } ], "title": "perl-YAML-LibYAML-0.59-2.11 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:10520-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "perl-YAML-LibYAML-0.59-2.11.aarch64", "product": { "name": "perl-YAML-LibYAML-0.59-2.11.aarch64", "product_id": "perl-YAML-LibYAML-0.59-2.11.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "perl-YAML-LibYAML-0.59-2.11.ppc64le", "product": { "name": "perl-YAML-LibYAML-0.59-2.11.ppc64le", "product_id": "perl-YAML-LibYAML-0.59-2.11.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "perl-YAML-LibYAML-0.59-2.11.s390x", "product": { "name": "perl-YAML-LibYAML-0.59-2.11.s390x", "product_id": "perl-YAML-LibYAML-0.59-2.11.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "perl-YAML-LibYAML-0.59-2.11.x86_64", "product": { "name": "perl-YAML-LibYAML-0.59-2.11.x86_64", "product_id": "perl-YAML-LibYAML-0.59-2.11.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "perl-YAML-LibYAML-0.59-2.11.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:perl-YAML-LibYAML-0.59-2.11.aarch64" }, "product_reference": "perl-YAML-LibYAML-0.59-2.11.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "perl-YAML-LibYAML-0.59-2.11.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:perl-YAML-LibYAML-0.59-2.11.ppc64le" }, "product_reference": "perl-YAML-LibYAML-0.59-2.11.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "perl-YAML-LibYAML-0.59-2.11.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:perl-YAML-LibYAML-0.59-2.11.s390x" }, "product_reference": "perl-YAML-LibYAML-0.59-2.11.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "perl-YAML-LibYAML-0.59-2.11.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:perl-YAML-LibYAML-0.59-2.11.x86_64" }, "product_reference": "perl-YAML-LibYAML-0.59-2.11.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2012-1152", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-1152" } ], "notes": [ { "category": "general", "text": "Multiple format string vulnerabilities in the error reporting functionality in the YAML::LibYAML (aka YAML-LibYAML and perl-YAML-LibYAML) module 0.38 for Perl allow remote attackers to cause a denial of service (process crash) via format string specifiers in a (1) YAML stream to the Load function, (2) YAML node to the load_node function, (3) YAML mapping to the load_mapping function, or (4) YAML sequence to the load_sequence function.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:perl-YAML-LibYAML-0.59-2.11.aarch64", "openSUSE Tumbleweed:perl-YAML-LibYAML-0.59-2.11.ppc64le", "openSUSE Tumbleweed:perl-YAML-LibYAML-0.59-2.11.s390x", "openSUSE Tumbleweed:perl-YAML-LibYAML-0.59-2.11.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-1152", "url": "https://www.suse.com/security/cve/CVE-2012-1152" }, { "category": "external", "summary": "SUSE Bug 751503 for CVE-2012-1152", "url": "https://bugzilla.suse.com/751503" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:perl-YAML-LibYAML-0.59-2.11.aarch64", "openSUSE Tumbleweed:perl-YAML-LibYAML-0.59-2.11.ppc64le", "openSUSE Tumbleweed:perl-YAML-LibYAML-0.59-2.11.s390x", "openSUSE Tumbleweed:perl-YAML-LibYAML-0.59-2.11.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2012-1152" }, { "cve": "CVE-2013-6393", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6393" } ], "notes": [ { "category": "general", "text": "The yaml_parser_scan_tag_uri function in scanner.c in LibYAML before 0.1.5 performs an incorrect cast, which allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted tags in a YAML document, which triggers a heap-based buffer overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:perl-YAML-LibYAML-0.59-2.11.aarch64", "openSUSE Tumbleweed:perl-YAML-LibYAML-0.59-2.11.ppc64le", "openSUSE Tumbleweed:perl-YAML-LibYAML-0.59-2.11.s390x", "openSUSE Tumbleweed:perl-YAML-LibYAML-0.59-2.11.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6393", "url": "https://www.suse.com/security/cve/CVE-2013-6393" }, { "category": "external", "summary": "SUSE Bug 860617 for CVE-2013-6393", "url": "https://bugzilla.suse.com/860617" }, { "category": "external", "summary": "SUSE Bug 911782 for CVE-2013-6393", "url": "https://bugzilla.suse.com/911782" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:perl-YAML-LibYAML-0.59-2.11.aarch64", "openSUSE Tumbleweed:perl-YAML-LibYAML-0.59-2.11.ppc64le", "openSUSE Tumbleweed:perl-YAML-LibYAML-0.59-2.11.s390x", "openSUSE Tumbleweed:perl-YAML-LibYAML-0.59-2.11.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2013-6393" }, { "cve": "CVE-2014-2525", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-2525" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in the yaml_parser_scan_uri_escapes function in LibYAML before 0.1.6 allows context-dependent attackers to execute arbitrary code via a long sequence of percent-encoded characters in a URI in a YAML file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:perl-YAML-LibYAML-0.59-2.11.aarch64", "openSUSE Tumbleweed:perl-YAML-LibYAML-0.59-2.11.ppc64le", "openSUSE Tumbleweed:perl-YAML-LibYAML-0.59-2.11.s390x", "openSUSE Tumbleweed:perl-YAML-LibYAML-0.59-2.11.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-2525", "url": "https://www.suse.com/security/cve/CVE-2014-2525" }, { "category": "external", "summary": "SUSE Bug 868944 for CVE-2014-2525", "url": "https://bugzilla.suse.com/868944" }, { "category": "external", "summary": "SUSE Bug 911782 for CVE-2014-2525", "url": "https://bugzilla.suse.com/911782" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:perl-YAML-LibYAML-0.59-2.11.aarch64", "openSUSE Tumbleweed:perl-YAML-LibYAML-0.59-2.11.ppc64le", "openSUSE Tumbleweed:perl-YAML-LibYAML-0.59-2.11.s390x", "openSUSE Tumbleweed:perl-YAML-LibYAML-0.59-2.11.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-2525" }, { "cve": "CVE-2014-9130", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9130" } ], "notes": [ { "category": "general", "text": "scanner.c in LibYAML 0.1.5 and 0.1.6, as used in the YAML-LibYAML (aka YAML-XS) module for Perl, allows context-dependent attackers to cause a denial of service (assertion failure and crash) via vectors involving line-wrapping.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:perl-YAML-LibYAML-0.59-2.11.aarch64", "openSUSE Tumbleweed:perl-YAML-LibYAML-0.59-2.11.ppc64le", "openSUSE Tumbleweed:perl-YAML-LibYAML-0.59-2.11.s390x", "openSUSE Tumbleweed:perl-YAML-LibYAML-0.59-2.11.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9130", "url": "https://www.suse.com/security/cve/CVE-2014-9130" }, { "category": "external", "summary": "SUSE Bug 907809 for CVE-2014-9130", "url": "https://bugzilla.suse.com/907809" }, { "category": "external", "summary": "SUSE Bug 911782 for CVE-2014-9130", "url": "https://bugzilla.suse.com/911782" }, { "category": "external", "summary": "SUSE Bug 921588 for CVE-2014-9130", "url": "https://bugzilla.suse.com/921588" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:perl-YAML-LibYAML-0.59-2.11.aarch64", "openSUSE Tumbleweed:perl-YAML-LibYAML-0.59-2.11.ppc64le", "openSUSE Tumbleweed:perl-YAML-LibYAML-0.59-2.11.s390x", "openSUSE Tumbleweed:perl-YAML-LibYAML-0.59-2.11.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-9130" } ] }
gsd-2014-9130
Vulnerability from gsd
Modified
2023-12-13 01:22
Details
scanner.c in LibYAML 0.1.5 and 0.1.6, as used in the YAML-LibYAML (aka YAML-XS) module for Perl, allows context-dependent attackers to cause a denial of service (assertion failure and crash) via vectors involving line-wrapping.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2014-9130", "description": "scanner.c in LibYAML 0.1.5 and 0.1.6, as used in the YAML-LibYAML (aka YAML-XS) module for Perl, allows context-dependent attackers to cause a denial of service (assertion failure and crash) via vectors involving line-wrapping.", "id": "GSD-2014-9130", "references": [ "https://www.suse.com/security/cve/CVE-2014-9130.html", "https://www.debian.org/security/2014/dsa-3115", "https://www.debian.org/security/2014/dsa-3103", "https://www.debian.org/security/2014/dsa-3102", "https://access.redhat.com/errata/RHSA-2015:0260", "https://access.redhat.com/errata/RHSA-2015:0112", "https://access.redhat.com/errata/RHSA-2015:0100", "https://ubuntu.com/security/CVE-2014-9130", "https://advisories.mageia.org/CVE-2014-9130.html", "https://alas.aws.amazon.com/cve/html/CVE-2014-9130.html", "https://linux.oracle.com/cve/CVE-2014-9130.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2014-9130" ], "details": "scanner.c in LibYAML 0.1.5 and 0.1.6, as used in the YAML-LibYAML (aka YAML-XS) module for Perl, allows context-dependent attackers to cause a denial of service (assertion failure and crash) via vectors involving line-wrapping.", "id": "GSD-2014-9130", "modified": "2023-12-13T01:22:48.369007Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-9130", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "scanner.c in LibYAML 0.1.5 and 0.1.6, as used in the YAML-LibYAML (aka YAML-XS) module for Perl, allows context-dependent attackers to cause a denial of service (assertion failure and crash) via vectors involving line-wrapping." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "62705", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62705" }, { "name": "https://bitbucket.org/xi/libyaml/commits/2b9156756423e967cfd09a61d125d883fca6f4f2", "refsource": "CONFIRM", "url": "https://bitbucket.org/xi/libyaml/commits/2b9156756423e967cfd09a61d125d883fca6f4f2" }, { "name": "71349", "refsource": "BID", "url": "http://www.securityfocus.com/bid/71349" }, { "name": "DSA-3102", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2014/dsa-3102" }, { "name": "62174", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62174" }, { "name": "RHSA-2015:0112", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2015-0112.html" }, { "name": "[oss-security] 20141128 libyaml / YAML-LibYAML DoS", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2014/11/28/1" }, { "name": "MDVSA-2015:060", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:060" }, { "name": "USN-2461-3", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2461-3" }, { "name": "DSA-3115", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2014/dsa-3115" }, { "name": "openSUSE-SU-2015:0319", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00078.html" }, { "name": "[oss-security] 20141129 Re: Re: libyaml / YAML-LibYAML DoS", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2014/11/29/3" }, { "name": "62774", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62774" }, { "name": "[oss-security] 20141128 Re: libyaml / YAML-LibYAML DoS", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2014/11/28/8" }, { "name": "RHSA-2015:0260", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2015-0260.html" }, { "name": "62723", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62723" }, { "name": "USN-2461-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2461-1" }, { "name": "https://puppet.com/security/cve/cve-2014-9130", "refsource": "CONFIRM", "url": "https://puppet.com/security/cve/cve-2014-9130" }, { "name": "USN-2461-2", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2461-2" }, { "name": "62176", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62176" }, { "name": "https://bitbucket.org/xi/libyaml/issue/10/wrapped-strings-cause-assert-failure", "refsource": "MISC", "url": "https://bitbucket.org/xi/libyaml/issue/10/wrapped-strings-cause-assert-failure" }, { "name": "MDVSA-2014:242", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:242" }, { "name": "DSA-3103", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2014/dsa-3103" }, { "name": "60944", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60944" }, { "name": "openSUSE-SU-2016:1067", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2016-04/msg00050.html" }, { "name": "62164", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62164" }, { "name": "libyaml-cve20149130-dos(99047)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99047" }, { "name": "RHSA-2015:0100", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2015-0100.html" }, { "name": "http://linux.oracle.com/errata/ELSA-2015-0100.html", "refsource": "CONFIRM", "url": "http://linux.oracle.com/errata/ELSA-2015-0100.html" }, { "name": "59947", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59947" }, { "name": "http://advisories.mageia.org/MGASA-2014-0508.html", "refsource": "CONFIRM", "url": "http://advisories.mageia.org/MGASA-2014-0508.html" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:pyyaml:libyaml:0.1.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:pyyaml:libyaml:0.1.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-9130" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "scanner.c in LibYAML 0.1.5 and 0.1.6, as used in the YAML-LibYAML (aka YAML-XS) module for Perl, allows context-dependent attackers to cause a denial of service (assertion failure and crash) via vectors involving line-wrapping." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-20" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20141129 Re: Re: libyaml / YAML-LibYAML DoS", "refsource": "MLIST", "tags": [], "url": "http://www.openwall.com/lists/oss-security/2014/11/29/3" }, { "name": "[oss-security] 20141128 Re: libyaml / YAML-LibYAML DoS", "refsource": "MLIST", "tags": [], "url": "http://www.openwall.com/lists/oss-security/2014/11/28/8" }, { "name": "https://bitbucket.org/xi/libyaml/commits/2b9156756423e967cfd09a61d125d883fca6f4f2", "refsource": "CONFIRM", "tags": [ "Exploit" ], "url": "https://bitbucket.org/xi/libyaml/commits/2b9156756423e967cfd09a61d125d883fca6f4f2" }, { "name": "71349", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/71349" }, { "name": "59947", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/59947" }, { "name": "https://bitbucket.org/xi/libyaml/issue/10/wrapped-strings-cause-assert-failure", "refsource": "MISC", "tags": [ "Exploit" ], "url": "https://bitbucket.org/xi/libyaml/issue/10/wrapped-strings-cause-assert-failure" }, { "name": "60944", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/60944" }, { "name": "[oss-security] 20141128 libyaml / YAML-LibYAML DoS", "refsource": "MLIST", "tags": [ "Exploit" ], "url": "http://www.openwall.com/lists/oss-security/2014/11/28/1" }, { "name": "http://linux.oracle.com/errata/ELSA-2015-0100.html", "refsource": "CONFIRM", "tags": [], "url": "http://linux.oracle.com/errata/ELSA-2015-0100.html" }, { "name": "62723", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/62723" }, { "name": "62705", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/62705" }, { "name": "62774", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/62774" }, { "name": "USN-2461-2", "refsource": "UBUNTU", "tags": [], "url": "http://www.ubuntu.com/usn/USN-2461-2" }, { "name": "USN-2461-3", "refsource": "UBUNTU", "tags": [], "url": "http://www.ubuntu.com/usn/USN-2461-3" }, { "name": "USN-2461-1", "refsource": "UBUNTU", "tags": [], "url": "http://www.ubuntu.com/usn/USN-2461-1" }, { "name": "RHSA-2015:0100", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-0100.html" }, { "name": "DSA-3103", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2014/dsa-3103" }, { "name": "RHSA-2015:0112", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-0112.html" }, { "name": "DSA-3102", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2014/dsa-3102" }, { "name": "DSA-3115", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2014/dsa-3115" }, { "name": "RHSA-2015:0260", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-0260.html" }, { "name": "openSUSE-SU-2015:0319", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00078.html" }, { "name": "MDVSA-2015:060", "refsource": "MANDRIVA", "tags": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:060" }, { "name": "MDVSA-2014:242", "refsource": "MANDRIVA", "tags": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:242" }, { "name": "http://advisories.mageia.org/MGASA-2014-0508.html", "refsource": "CONFIRM", "tags": [], "url": "http://advisories.mageia.org/MGASA-2014-0508.html" }, { "name": "openSUSE-SU-2016:1067", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-04/msg00050.html" }, { "name": "62176", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/62176" }, { "name": "62174", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/62174" }, { "name": "62164", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/62164" }, { "name": "libyaml-cve20149130-dos(99047)", "refsource": "XF", "tags": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99047" }, { "name": "https://puppet.com/security/cve/cve-2014-9130", "refsource": "CONFIRM", "tags": [], "url": "https://puppet.com/security/cve/cve-2014-9130" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false } }, "lastModifiedDate": "2017-12-09T02:29Z", "publishedDate": "2014-12-08T16:59Z" } } }
fkie_cve-2014-9130
Vulnerability from fkie_nvd
Published
2014-12-08 16:59
Modified
2025-04-12 10:46
Severity ?
Summary
scanner.c in LibYAML 0.1.5 and 0.1.6, as used in the YAML-LibYAML (aka YAML-XS) module for Perl, allows context-dependent attackers to cause a denial of service (assertion failure and crash) via vectors involving line-wrapping.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://advisories.mageia.org/MGASA-2014-0508.html | ||
cve@mitre.org | http://linux.oracle.com/errata/ELSA-2015-0100.html | ||
cve@mitre.org | http://lists.opensuse.org/opensuse-updates/2015-02/msg00078.html | ||
cve@mitre.org | http://lists.opensuse.org/opensuse-updates/2016-04/msg00050.html | ||
cve@mitre.org | http://rhn.redhat.com/errata/RHSA-2015-0100.html | ||
cve@mitre.org | http://rhn.redhat.com/errata/RHSA-2015-0112.html | ||
cve@mitre.org | http://rhn.redhat.com/errata/RHSA-2015-0260.html | ||
cve@mitre.org | http://secunia.com/advisories/59947 | ||
cve@mitre.org | http://secunia.com/advisories/60944 | ||
cve@mitre.org | http://secunia.com/advisories/62164 | ||
cve@mitre.org | http://secunia.com/advisories/62174 | ||
cve@mitre.org | http://secunia.com/advisories/62176 | ||
cve@mitre.org | http://secunia.com/advisories/62705 | ||
cve@mitre.org | http://secunia.com/advisories/62723 | ||
cve@mitre.org | http://secunia.com/advisories/62774 | ||
cve@mitre.org | http://www.debian.org/security/2014/dsa-3102 | ||
cve@mitre.org | http://www.debian.org/security/2014/dsa-3103 | ||
cve@mitre.org | http://www.debian.org/security/2014/dsa-3115 | ||
cve@mitre.org | http://www.mandriva.com/security/advisories?name=MDVSA-2014:242 | ||
cve@mitre.org | http://www.mandriva.com/security/advisories?name=MDVSA-2015:060 | ||
cve@mitre.org | http://www.openwall.com/lists/oss-security/2014/11/28/1 | Exploit | |
cve@mitre.org | http://www.openwall.com/lists/oss-security/2014/11/28/8 | ||
cve@mitre.org | http://www.openwall.com/lists/oss-security/2014/11/29/3 | ||
cve@mitre.org | http://www.securityfocus.com/bid/71349 | ||
cve@mitre.org | http://www.ubuntu.com/usn/USN-2461-1 | ||
cve@mitre.org | http://www.ubuntu.com/usn/USN-2461-2 | ||
cve@mitre.org | http://www.ubuntu.com/usn/USN-2461-3 | ||
cve@mitre.org | https://bitbucket.org/xi/libyaml/commits/2b9156756423e967cfd09a61d125d883fca6f4f2 | Exploit | |
cve@mitre.org | https://bitbucket.org/xi/libyaml/issue/10/wrapped-strings-cause-assert-failure | Exploit | |
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/99047 | ||
cve@mitre.org | https://puppet.com/security/cve/cve-2014-9130 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://advisories.mageia.org/MGASA-2014-0508.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://linux.oracle.com/errata/ELSA-2015-0100.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-updates/2015-02/msg00078.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-updates/2016-04/msg00050.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2015-0100.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2015-0112.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2015-0260.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/59947 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/60944 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/62164 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/62174 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/62176 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/62705 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/62723 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/62774 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2014/dsa-3102 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2014/dsa-3103 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2014/dsa-3115 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2014:242 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2015:060 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2014/11/28/1 | Exploit | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2014/11/28/8 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2014/11/29/3 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/71349 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-2461-1 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-2461-2 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-2461-3 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://bitbucket.org/xi/libyaml/commits/2b9156756423e967cfd09a61d125d883fca6f4f2 | Exploit | |
af854a3a-2127-422b-91ae-364da2661108 | https://bitbucket.org/xi/libyaml/issue/10/wrapped-strings-cause-assert-failure | Exploit | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/99047 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://puppet.com/security/cve/cve-2014-9130 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pyyaml:libyaml:0.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "D405B896-62ED-4064-9A84-EAD93843B2F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:pyyaml:libyaml:0.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "2E9B1BDC-8920-4D46-9879-0E491797F188", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "scanner.c in LibYAML 0.1.5 and 0.1.6, as used in the YAML-LibYAML (aka YAML-XS) module for Perl, allows context-dependent attackers to cause a denial of service (assertion failure and crash) via vectors involving line-wrapping." }, { "lang": "es", "value": "scanner.c en LibYAML 0.1.5 y 0.1.6, utilizado en el m\u00f3dulo YAML-LibYAML (tambi\u00e9n conocido como YAML-XS) para Perl, permite a atacantes dependientes de contexto causar una denegaci\u00f3n de servicio (fallo de aserci\u00f3n y ca\u00edda) a trav\u00e9s de vectores que involucran la envoltura de l\u00edneas (line-wrapping)." } ], "id": "CVE-2014-9130", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-12-08T16:59:04.450", "references": [ { "source": "cve@mitre.org", "url": "http://advisories.mageia.org/MGASA-2014-0508.html" }, { "source": "cve@mitre.org", "url": "http://linux.oracle.com/errata/ELSA-2015-0100.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00078.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-updates/2016-04/msg00050.html" }, { "source": "cve@mitre.org", "url": "http://rhn.redhat.com/errata/RHSA-2015-0100.html" }, { "source": "cve@mitre.org", "url": "http://rhn.redhat.com/errata/RHSA-2015-0112.html" }, { "source": "cve@mitre.org", "url": "http://rhn.redhat.com/errata/RHSA-2015-0260.html" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/59947" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/60944" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/62164" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/62174" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/62176" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/62705" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/62723" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/62774" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2014/dsa-3102" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2014/dsa-3103" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2014/dsa-3115" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:242" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:060" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.openwall.com/lists/oss-security/2014/11/28/1" }, { "source": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2014/11/28/8" }, { "source": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2014/11/29/3" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/71349" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/USN-2461-1" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/USN-2461-2" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/USN-2461-3" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://bitbucket.org/xi/libyaml/commits/2b9156756423e967cfd09a61d125d883fca6f4f2" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://bitbucket.org/xi/libyaml/issue/10/wrapped-strings-cause-assert-failure" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99047" }, { "source": "cve@mitre.org", "url": "https://puppet.com/security/cve/cve-2014-9130" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://advisories.mageia.org/MGASA-2014-0508.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://linux.oracle.com/errata/ELSA-2015-0100.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00078.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2016-04/msg00050.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2015-0100.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2015-0112.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2015-0260.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/59947" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/60944" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62164" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62174" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62176" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62705" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62723" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62774" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2014/dsa-3102" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2014/dsa-3103" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2014/dsa-3115" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:242" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:060" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.openwall.com/lists/oss-security/2014/11/28/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2014/11/28/8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2014/11/29/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/71349" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-2461-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-2461-2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-2461-3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://bitbucket.org/xi/libyaml/commits/2b9156756423e967cfd09a61d125d883fca6f4f2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://bitbucket.org/xi/libyaml/issue/10/wrapped-strings-cause-assert-failure" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99047" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://puppet.com/security/cve/cve-2014-9130" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
rhsa-2015:0100
Vulnerability from csaf_redhat
Published
2015-01-28 17:35
Modified
2025-08-01 21:44
Summary
Red Hat Security Advisory: libyaml security update
Notes
Topic
Updated libyaml packages that fix one security issue are now available for
Red Hat Enterprise Linux 6 and 7.
Red Hat Product Security has rated this update as having Moderate security
impact. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available from the CVE link in the
References section.
Details
YAML is a data serialization format designed for human readability and
interaction with scripting languages. LibYAML is a YAML parser and emitter
written in C.
An assertion failure was found in the way the libyaml library parsed
wrapped strings. An attacker able to load specially crafted YAML input into
an application using libyaml could cause the application to crash.
(CVE-2014-9130)
All libyaml users are advised to upgrade to these updated packages, which
contain a backported patch to correct this issue. All running applications
linked against the libyaml library must be restarted for this update to
take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated libyaml packages that fix one security issue are now available for\nRed Hat Enterprise Linux 6 and 7.\n\nRed Hat Product Security has rated this update as having Moderate security\nimpact. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available from the CVE link in the\nReferences section.", "title": "Topic" }, { "category": "general", "text": "YAML is a data serialization format designed for human readability and\ninteraction with scripting languages. LibYAML is a YAML parser and emitter\nwritten in C.\n\nAn assertion failure was found in the way the libyaml library parsed\nwrapped strings. An attacker able to load specially crafted YAML input into\nan application using libyaml could cause the application to crash.\n(CVE-2014-9130)\n\nAll libyaml users are advised to upgrade to these updated packages, which\ncontain a backported patch to correct this issue. All running applications\nlinked against the libyaml library must be restarted for this update to\ntake effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2015:0100", "url": "https://access.redhat.com/errata/RHSA-2015:0100" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1169369", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1169369" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhsa-2015_0100.json" } ], "title": "Red Hat Security Advisory: libyaml security update", "tracking": { "current_release_date": "2025-08-01T21:44:19+00:00", "generator": { "date": "2025-08-01T21:44:19+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2015:0100", "initial_release_date": "2015-01-28T17:35:23+00:00", "revision_history": [ { "date": "2015-01-28T17:35:23+00:00", "number": "1", "summary": "Initial version" }, { "date": "2015-01-28T17:35:23+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-01T21:44:19+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Client (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "libyaml-debuginfo-0:0.1.4-11.el7_0.ppc", "product": { "name": "libyaml-debuginfo-0:0.1.4-11.el7_0.ppc", "product_id": "libyaml-debuginfo-0:0.1.4-11.el7_0.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/libyaml-debuginfo@0.1.4-11.el7_0?arch=ppc" } } }, { "category": "product_version", "name": "libyaml-0:0.1.4-11.el7_0.ppc", "product": { "name": "libyaml-0:0.1.4-11.el7_0.ppc", "product_id": "libyaml-0:0.1.4-11.el7_0.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/libyaml@0.1.4-11.el7_0?arch=ppc" } } }, { "category": "product_version", "name": "libyaml-devel-0:0.1.4-11.el7_0.ppc", "product": { "name": "libyaml-devel-0:0.1.4-11.el7_0.ppc", "product_id": "libyaml-devel-0:0.1.4-11.el7_0.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/libyaml-devel@0.1.4-11.el7_0?arch=ppc" } } }, { "category": "product_version", "name": "libyaml-debuginfo-0:0.1.3-4.el6_6.ppc", "product": { "name": "libyaml-debuginfo-0:0.1.3-4.el6_6.ppc", "product_id": "libyaml-debuginfo-0:0.1.3-4.el6_6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/libyaml-debuginfo@0.1.3-4.el6_6?arch=ppc" } } }, { "category": "product_version", "name": "libyaml-0:0.1.3-4.el6_6.ppc", "product": { "name": "libyaml-0:0.1.3-4.el6_6.ppc", "product_id": "libyaml-0:0.1.3-4.el6_6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/libyaml@0.1.3-4.el6_6?arch=ppc" } } }, { "category": "product_version", "name": "libyaml-devel-0:0.1.3-4.el6_6.ppc", "product": { "name": "libyaml-devel-0:0.1.3-4.el6_6.ppc", "product_id": "libyaml-devel-0:0.1.3-4.el6_6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/libyaml-devel@0.1.3-4.el6_6?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "libyaml-debuginfo-0:0.1.4-11.el7_0.ppc64", "product": { "name": "libyaml-debuginfo-0:0.1.4-11.el7_0.ppc64", "product_id": "libyaml-debuginfo-0:0.1.4-11.el7_0.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libyaml-debuginfo@0.1.4-11.el7_0?arch=ppc64" } } }, { "category": "product_version", "name": "libyaml-0:0.1.4-11.el7_0.ppc64", "product": { "name": "libyaml-0:0.1.4-11.el7_0.ppc64", "product_id": "libyaml-0:0.1.4-11.el7_0.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libyaml@0.1.4-11.el7_0?arch=ppc64" } } }, { "category": "product_version", "name": "libyaml-devel-0:0.1.4-11.el7_0.ppc64", "product": { "name": "libyaml-devel-0:0.1.4-11.el7_0.ppc64", "product_id": "libyaml-devel-0:0.1.4-11.el7_0.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libyaml-devel@0.1.4-11.el7_0?arch=ppc64" } } }, { "category": "product_version", "name": "libyaml-debuginfo-0:0.1.3-4.el6_6.ppc64", "product": { "name": "libyaml-debuginfo-0:0.1.3-4.el6_6.ppc64", "product_id": "libyaml-debuginfo-0:0.1.3-4.el6_6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libyaml-debuginfo@0.1.3-4.el6_6?arch=ppc64" } } }, { "category": "product_version", "name": "libyaml-0:0.1.3-4.el6_6.ppc64", "product": { "name": "libyaml-0:0.1.3-4.el6_6.ppc64", "product_id": "libyaml-0:0.1.3-4.el6_6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libyaml@0.1.3-4.el6_6?arch=ppc64" } } }, { "category": "product_version", "name": "libyaml-devel-0:0.1.3-4.el6_6.ppc64", "product": { "name": "libyaml-devel-0:0.1.3-4.el6_6.ppc64", "product_id": "libyaml-devel-0:0.1.3-4.el6_6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libyaml-devel@0.1.3-4.el6_6?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "libyaml-debuginfo-0:0.1.4-11.el7_0.s390x", "product": { "name": "libyaml-debuginfo-0:0.1.4-11.el7_0.s390x", "product_id": "libyaml-debuginfo-0:0.1.4-11.el7_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libyaml-debuginfo@0.1.4-11.el7_0?arch=s390x" } } }, { "category": "product_version", "name": "libyaml-0:0.1.4-11.el7_0.s390x", "product": { "name": "libyaml-0:0.1.4-11.el7_0.s390x", "product_id": "libyaml-0:0.1.4-11.el7_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libyaml@0.1.4-11.el7_0?arch=s390x" } } }, { "category": "product_version", "name": "libyaml-devel-0:0.1.4-11.el7_0.s390x", "product": { "name": "libyaml-devel-0:0.1.4-11.el7_0.s390x", "product_id": "libyaml-devel-0:0.1.4-11.el7_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libyaml-devel@0.1.4-11.el7_0?arch=s390x" } } }, { "category": "product_version", "name": "libyaml-debuginfo-0:0.1.3-4.el6_6.s390x", "product": { "name": "libyaml-debuginfo-0:0.1.3-4.el6_6.s390x", "product_id": "libyaml-debuginfo-0:0.1.3-4.el6_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libyaml-debuginfo@0.1.3-4.el6_6?arch=s390x" } } }, { "category": "product_version", "name": "libyaml-0:0.1.3-4.el6_6.s390x", "product": { "name": "libyaml-0:0.1.3-4.el6_6.s390x", "product_id": "libyaml-0:0.1.3-4.el6_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libyaml@0.1.3-4.el6_6?arch=s390x" } } }, { "category": "product_version", "name": "libyaml-devel-0:0.1.3-4.el6_6.s390x", "product": { "name": "libyaml-devel-0:0.1.3-4.el6_6.s390x", "product_id": "libyaml-devel-0:0.1.3-4.el6_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libyaml-devel@0.1.3-4.el6_6?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "libyaml-debuginfo-0:0.1.4-11.el7_0.s390", "product": { "name": "libyaml-debuginfo-0:0.1.4-11.el7_0.s390", "product_id": "libyaml-debuginfo-0:0.1.4-11.el7_0.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/libyaml-debuginfo@0.1.4-11.el7_0?arch=s390" } } }, { "category": "product_version", "name": "libyaml-0:0.1.4-11.el7_0.s390", "product": { "name": "libyaml-0:0.1.4-11.el7_0.s390", "product_id": "libyaml-0:0.1.4-11.el7_0.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/libyaml@0.1.4-11.el7_0?arch=s390" } } }, { "category": "product_version", "name": "libyaml-devel-0:0.1.4-11.el7_0.s390", "product": { "name": "libyaml-devel-0:0.1.4-11.el7_0.s390", "product_id": "libyaml-devel-0:0.1.4-11.el7_0.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/libyaml-devel@0.1.4-11.el7_0?arch=s390" } } }, { "category": "product_version", "name": "libyaml-debuginfo-0:0.1.3-4.el6_6.s390", "product": { "name": "libyaml-debuginfo-0:0.1.3-4.el6_6.s390", "product_id": "libyaml-debuginfo-0:0.1.3-4.el6_6.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/libyaml-debuginfo@0.1.3-4.el6_6?arch=s390" } } }, { "category": "product_version", "name": "libyaml-0:0.1.3-4.el6_6.s390", "product": { "name": "libyaml-0:0.1.3-4.el6_6.s390", "product_id": "libyaml-0:0.1.3-4.el6_6.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/libyaml@0.1.3-4.el6_6?arch=s390" } } }, { "category": "product_version", "name": "libyaml-devel-0:0.1.3-4.el6_6.s390", "product": { "name": "libyaml-devel-0:0.1.3-4.el6_6.s390", "product_id": "libyaml-devel-0:0.1.3-4.el6_6.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/libyaml-devel@0.1.3-4.el6_6?arch=s390" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "libyaml-debuginfo-0:0.1.4-11.el7_0.i686", "product": { "name": "libyaml-debuginfo-0:0.1.4-11.el7_0.i686", "product_id": "libyaml-debuginfo-0:0.1.4-11.el7_0.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libyaml-debuginfo@0.1.4-11.el7_0?arch=i686" } } }, { "category": "product_version", "name": "libyaml-0:0.1.4-11.el7_0.i686", "product": { "name": "libyaml-0:0.1.4-11.el7_0.i686", "product_id": "libyaml-0:0.1.4-11.el7_0.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libyaml@0.1.4-11.el7_0?arch=i686" } } }, { "category": "product_version", "name": "libyaml-devel-0:0.1.4-11.el7_0.i686", "product": { "name": "libyaml-devel-0:0.1.4-11.el7_0.i686", "product_id": "libyaml-devel-0:0.1.4-11.el7_0.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libyaml-devel@0.1.4-11.el7_0?arch=i686" } } }, { "category": "product_version", "name": "libyaml-debuginfo-0:0.1.3-4.el6_6.i686", "product": { "name": "libyaml-debuginfo-0:0.1.3-4.el6_6.i686", "product_id": "libyaml-debuginfo-0:0.1.3-4.el6_6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libyaml-debuginfo@0.1.3-4.el6_6?arch=i686" } } }, { "category": "product_version", "name": "libyaml-0:0.1.3-4.el6_6.i686", "product": { "name": "libyaml-0:0.1.3-4.el6_6.i686", "product_id": "libyaml-0:0.1.3-4.el6_6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libyaml@0.1.3-4.el6_6?arch=i686" } } }, { "category": "product_version", "name": "libyaml-devel-0:0.1.3-4.el6_6.i686", "product": { "name": "libyaml-devel-0:0.1.3-4.el6_6.i686", "product_id": "libyaml-devel-0:0.1.3-4.el6_6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libyaml-devel@0.1.3-4.el6_6?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "libyaml-debuginfo-0:0.1.4-11.el7_0.x86_64", "product": { "name": "libyaml-debuginfo-0:0.1.4-11.el7_0.x86_64", "product_id": "libyaml-debuginfo-0:0.1.4-11.el7_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libyaml-debuginfo@0.1.4-11.el7_0?arch=x86_64" } } }, { "category": "product_version", "name": "libyaml-0:0.1.4-11.el7_0.x86_64", "product": { "name": "libyaml-0:0.1.4-11.el7_0.x86_64", "product_id": "libyaml-0:0.1.4-11.el7_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libyaml@0.1.4-11.el7_0?arch=x86_64" } } }, { "category": "product_version", "name": "libyaml-devel-0:0.1.4-11.el7_0.x86_64", "product": { "name": "libyaml-devel-0:0.1.4-11.el7_0.x86_64", "product_id": "libyaml-devel-0:0.1.4-11.el7_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libyaml-devel@0.1.4-11.el7_0?arch=x86_64" } } }, { "category": "product_version", "name": "libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64", "product": { "name": "libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64", "product_id": "libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libyaml-debuginfo@0.1.3-4.el6_6?arch=x86_64" } } }, { "category": "product_version", "name": "libyaml-0:0.1.3-4.el6_6.x86_64", "product": { "name": "libyaml-0:0.1.3-4.el6_6.x86_64", "product_id": "libyaml-0:0.1.3-4.el6_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libyaml@0.1.3-4.el6_6?arch=x86_64" } } }, { "category": "product_version", "name": "libyaml-devel-0:0.1.3-4.el6_6.x86_64", "product": { "name": "libyaml-devel-0:0.1.3-4.el6_6.x86_64", "product_id": "libyaml-devel-0:0.1.3-4.el6_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libyaml-devel@0.1.3-4.el6_6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "libyaml-0:0.1.4-11.el7_0.src", "product": { "name": "libyaml-0:0.1.4-11.el7_0.src", "product_id": "libyaml-0:0.1.4-11.el7_0.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/libyaml@0.1.4-11.el7_0?arch=src" } } }, { "category": "product_version", "name": "libyaml-0:0.1.3-4.el6_6.src", "product": { "name": "libyaml-0:0.1.3-4.el6_6.src", "product_id": "libyaml-0:0.1.3-4.el6_6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/libyaml@0.1.3-4.el6_6?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.3-4.el6_6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:libyaml-0:0.1.3-4.el6_6.i686" }, "product_reference": "libyaml-0:0.1.3-4.el6_6.i686", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.3-4.el6_6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:libyaml-0:0.1.3-4.el6_6.ppc" }, "product_reference": "libyaml-0:0.1.3-4.el6_6.ppc", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.3-4.el6_6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:libyaml-0:0.1.3-4.el6_6.ppc64" }, "product_reference": "libyaml-0:0.1.3-4.el6_6.ppc64", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.3-4.el6_6.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:libyaml-0:0.1.3-4.el6_6.s390" }, "product_reference": "libyaml-0:0.1.3-4.el6_6.s390", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.3-4.el6_6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:libyaml-0:0.1.3-4.el6_6.s390x" }, "product_reference": "libyaml-0:0.1.3-4.el6_6.s390x", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.3-4.el6_6.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:libyaml-0:0.1.3-4.el6_6.src" }, "product_reference": "libyaml-0:0.1.3-4.el6_6.src", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.3-4.el6_6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:libyaml-0:0.1.3-4.el6_6.x86_64" }, "product_reference": "libyaml-0:0.1.3-4.el6_6.x86_64", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.3-4.el6_6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.i686" }, "product_reference": "libyaml-debuginfo-0:0.1.3-4.el6_6.i686", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.3-4.el6_6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.ppc" }, "product_reference": "libyaml-debuginfo-0:0.1.3-4.el6_6.ppc", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.3-4.el6_6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.ppc64" }, "product_reference": "libyaml-debuginfo-0:0.1.3-4.el6_6.ppc64", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.3-4.el6_6.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.s390" }, "product_reference": "libyaml-debuginfo-0:0.1.3-4.el6_6.s390", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.3-4.el6_6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.s390x" }, "product_reference": "libyaml-debuginfo-0:0.1.3-4.el6_6.s390x", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64" }, "product_reference": "libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.3-4.el6_6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.i686" }, "product_reference": "libyaml-devel-0:0.1.3-4.el6_6.i686", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.3-4.el6_6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.ppc" }, "product_reference": "libyaml-devel-0:0.1.3-4.el6_6.ppc", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.3-4.el6_6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.ppc64" }, "product_reference": "libyaml-devel-0:0.1.3-4.el6_6.ppc64", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.3-4.el6_6.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.s390" }, "product_reference": "libyaml-devel-0:0.1.3-4.el6_6.s390", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.3-4.el6_6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.s390x" }, "product_reference": "libyaml-devel-0:0.1.3-4.el6_6.s390x", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.3-4.el6_6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.x86_64" }, "product_reference": "libyaml-devel-0:0.1.3-4.el6_6.x86_64", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.3-4.el6_6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.i686" }, "product_reference": "libyaml-0:0.1.3-4.el6_6.i686", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.3-4.el6_6.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.ppc" }, "product_reference": "libyaml-0:0.1.3-4.el6_6.ppc", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.3-4.el6_6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.ppc64" }, "product_reference": "libyaml-0:0.1.3-4.el6_6.ppc64", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.3-4.el6_6.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.s390" }, "product_reference": "libyaml-0:0.1.3-4.el6_6.s390", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.3-4.el6_6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.s390x" }, "product_reference": "libyaml-0:0.1.3-4.el6_6.s390x", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.3-4.el6_6.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.src" }, "product_reference": "libyaml-0:0.1.3-4.el6_6.src", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.3-4.el6_6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.x86_64" }, "product_reference": "libyaml-0:0.1.3-4.el6_6.x86_64", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.3-4.el6_6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.i686" }, "product_reference": "libyaml-debuginfo-0:0.1.3-4.el6_6.i686", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.3-4.el6_6.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.ppc" }, "product_reference": "libyaml-debuginfo-0:0.1.3-4.el6_6.ppc", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.3-4.el6_6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.ppc64" }, "product_reference": "libyaml-debuginfo-0:0.1.3-4.el6_6.ppc64", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.3-4.el6_6.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.s390" }, "product_reference": "libyaml-debuginfo-0:0.1.3-4.el6_6.s390", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.3-4.el6_6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.s390x" }, "product_reference": "libyaml-debuginfo-0:0.1.3-4.el6_6.s390x", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64" }, "product_reference": "libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.3-4.el6_6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.i686" }, "product_reference": "libyaml-devel-0:0.1.3-4.el6_6.i686", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.3-4.el6_6.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.ppc" }, "product_reference": "libyaml-devel-0:0.1.3-4.el6_6.ppc", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.3-4.el6_6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.ppc64" }, "product_reference": "libyaml-devel-0:0.1.3-4.el6_6.ppc64", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.3-4.el6_6.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.s390" }, "product_reference": "libyaml-devel-0:0.1.3-4.el6_6.s390", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.3-4.el6_6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.s390x" }, "product_reference": "libyaml-devel-0:0.1.3-4.el6_6.s390x", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.3-4.el6_6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.x86_64" }, "product_reference": "libyaml-devel-0:0.1.3-4.el6_6.x86_64", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.3-4.el6_6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:libyaml-0:0.1.3-4.el6_6.i686" }, "product_reference": "libyaml-0:0.1.3-4.el6_6.i686", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.3-4.el6_6.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:libyaml-0:0.1.3-4.el6_6.ppc" }, "product_reference": "libyaml-0:0.1.3-4.el6_6.ppc", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.3-4.el6_6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:libyaml-0:0.1.3-4.el6_6.ppc64" }, "product_reference": "libyaml-0:0.1.3-4.el6_6.ppc64", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.3-4.el6_6.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:libyaml-0:0.1.3-4.el6_6.s390" }, "product_reference": "libyaml-0:0.1.3-4.el6_6.s390", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.3-4.el6_6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:libyaml-0:0.1.3-4.el6_6.s390x" }, "product_reference": "libyaml-0:0.1.3-4.el6_6.s390x", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.3-4.el6_6.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:libyaml-0:0.1.3-4.el6_6.src" }, "product_reference": "libyaml-0:0.1.3-4.el6_6.src", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.3-4.el6_6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:libyaml-0:0.1.3-4.el6_6.x86_64" }, "product_reference": "libyaml-0:0.1.3-4.el6_6.x86_64", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.3-4.el6_6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.i686" }, "product_reference": "libyaml-debuginfo-0:0.1.3-4.el6_6.i686", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.3-4.el6_6.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.ppc" }, "product_reference": "libyaml-debuginfo-0:0.1.3-4.el6_6.ppc", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.3-4.el6_6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.ppc64" }, "product_reference": "libyaml-debuginfo-0:0.1.3-4.el6_6.ppc64", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.3-4.el6_6.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.s390" }, "product_reference": "libyaml-debuginfo-0:0.1.3-4.el6_6.s390", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.3-4.el6_6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.s390x" }, "product_reference": "libyaml-debuginfo-0:0.1.3-4.el6_6.s390x", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64" }, "product_reference": "libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.3-4.el6_6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.i686" }, "product_reference": "libyaml-devel-0:0.1.3-4.el6_6.i686", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.3-4.el6_6.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.ppc" }, "product_reference": "libyaml-devel-0:0.1.3-4.el6_6.ppc", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.3-4.el6_6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.ppc64" }, "product_reference": "libyaml-devel-0:0.1.3-4.el6_6.ppc64", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.3-4.el6_6.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.s390" }, "product_reference": "libyaml-devel-0:0.1.3-4.el6_6.s390", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.3-4.el6_6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.s390x" }, "product_reference": "libyaml-devel-0:0.1.3-4.el6_6.s390x", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.3-4.el6_6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.x86_64" }, "product_reference": "libyaml-devel-0:0.1.3-4.el6_6.x86_64", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.3-4.el6_6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.i686" }, "product_reference": "libyaml-0:0.1.3-4.el6_6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.3-4.el6_6.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.ppc" }, "product_reference": "libyaml-0:0.1.3-4.el6_6.ppc", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.3-4.el6_6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.ppc64" }, "product_reference": "libyaml-0:0.1.3-4.el6_6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.3-4.el6_6.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.s390" }, "product_reference": "libyaml-0:0.1.3-4.el6_6.s390", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.3-4.el6_6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.s390x" }, "product_reference": "libyaml-0:0.1.3-4.el6_6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.3-4.el6_6.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.src" }, "product_reference": "libyaml-0:0.1.3-4.el6_6.src", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.3-4.el6_6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.x86_64" }, "product_reference": "libyaml-0:0.1.3-4.el6_6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.3-4.el6_6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.i686" }, "product_reference": "libyaml-debuginfo-0:0.1.3-4.el6_6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.3-4.el6_6.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.ppc" }, "product_reference": "libyaml-debuginfo-0:0.1.3-4.el6_6.ppc", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.3-4.el6_6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.ppc64" }, "product_reference": "libyaml-debuginfo-0:0.1.3-4.el6_6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.3-4.el6_6.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.s390" }, "product_reference": "libyaml-debuginfo-0:0.1.3-4.el6_6.s390", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.3-4.el6_6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.s390x" }, "product_reference": "libyaml-debuginfo-0:0.1.3-4.el6_6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64" }, "product_reference": "libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.3-4.el6_6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.i686" }, "product_reference": "libyaml-devel-0:0.1.3-4.el6_6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.3-4.el6_6.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.ppc" }, "product_reference": "libyaml-devel-0:0.1.3-4.el6_6.ppc", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.3-4.el6_6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.ppc64" }, "product_reference": "libyaml-devel-0:0.1.3-4.el6_6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.3-4.el6_6.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.s390" }, "product_reference": "libyaml-devel-0:0.1.3-4.el6_6.s390", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.3-4.el6_6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.s390x" }, "product_reference": "libyaml-devel-0:0.1.3-4.el6_6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.3-4.el6_6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.x86_64" }, "product_reference": "libyaml-devel-0:0.1.3-4.el6_6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.3-4.el6_6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:libyaml-0:0.1.3-4.el6_6.i686" }, "product_reference": "libyaml-0:0.1.3-4.el6_6.i686", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.3-4.el6_6.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:libyaml-0:0.1.3-4.el6_6.ppc" }, "product_reference": "libyaml-0:0.1.3-4.el6_6.ppc", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.3-4.el6_6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:libyaml-0:0.1.3-4.el6_6.ppc64" }, "product_reference": "libyaml-0:0.1.3-4.el6_6.ppc64", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.3-4.el6_6.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:libyaml-0:0.1.3-4.el6_6.s390" }, "product_reference": "libyaml-0:0.1.3-4.el6_6.s390", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.3-4.el6_6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:libyaml-0:0.1.3-4.el6_6.s390x" }, "product_reference": "libyaml-0:0.1.3-4.el6_6.s390x", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.3-4.el6_6.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:libyaml-0:0.1.3-4.el6_6.src" }, "product_reference": "libyaml-0:0.1.3-4.el6_6.src", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.3-4.el6_6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:libyaml-0:0.1.3-4.el6_6.x86_64" }, "product_reference": "libyaml-0:0.1.3-4.el6_6.x86_64", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.3-4.el6_6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.i686" }, "product_reference": "libyaml-debuginfo-0:0.1.3-4.el6_6.i686", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.3-4.el6_6.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.ppc" }, "product_reference": "libyaml-debuginfo-0:0.1.3-4.el6_6.ppc", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.3-4.el6_6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.ppc64" }, "product_reference": "libyaml-debuginfo-0:0.1.3-4.el6_6.ppc64", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.3-4.el6_6.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.s390" }, "product_reference": "libyaml-debuginfo-0:0.1.3-4.el6_6.s390", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.3-4.el6_6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.s390x" }, "product_reference": "libyaml-debuginfo-0:0.1.3-4.el6_6.s390x", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64" }, "product_reference": "libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.3-4.el6_6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.i686" }, "product_reference": "libyaml-devel-0:0.1.3-4.el6_6.i686", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.3-4.el6_6.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.ppc" }, "product_reference": "libyaml-devel-0:0.1.3-4.el6_6.ppc", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.3-4.el6_6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.ppc64" }, "product_reference": "libyaml-devel-0:0.1.3-4.el6_6.ppc64", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.3-4.el6_6.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.s390" }, "product_reference": "libyaml-devel-0:0.1.3-4.el6_6.s390", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.3-4.el6_6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.s390x" }, "product_reference": "libyaml-devel-0:0.1.3-4.el6_6.s390x", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.3-4.el6_6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.x86_64" }, "product_reference": "libyaml-devel-0:0.1.3-4.el6_6.x86_64", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.3-4.el6_6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.i686" }, "product_reference": "libyaml-0:0.1.3-4.el6_6.i686", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.3-4.el6_6.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.ppc" }, "product_reference": "libyaml-0:0.1.3-4.el6_6.ppc", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.3-4.el6_6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.ppc64" }, "product_reference": "libyaml-0:0.1.3-4.el6_6.ppc64", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.3-4.el6_6.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.s390" }, "product_reference": "libyaml-0:0.1.3-4.el6_6.s390", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.3-4.el6_6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.s390x" }, "product_reference": "libyaml-0:0.1.3-4.el6_6.s390x", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.3-4.el6_6.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.src" }, "product_reference": "libyaml-0:0.1.3-4.el6_6.src", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.3-4.el6_6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.x86_64" }, "product_reference": "libyaml-0:0.1.3-4.el6_6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.3-4.el6_6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.i686" }, "product_reference": "libyaml-debuginfo-0:0.1.3-4.el6_6.i686", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.3-4.el6_6.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.ppc" }, "product_reference": "libyaml-debuginfo-0:0.1.3-4.el6_6.ppc", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.3-4.el6_6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.ppc64" }, "product_reference": "libyaml-debuginfo-0:0.1.3-4.el6_6.ppc64", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.3-4.el6_6.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.s390" }, "product_reference": "libyaml-debuginfo-0:0.1.3-4.el6_6.s390", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.3-4.el6_6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.s390x" }, "product_reference": "libyaml-debuginfo-0:0.1.3-4.el6_6.s390x", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64" }, "product_reference": "libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.3-4.el6_6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.i686" }, "product_reference": "libyaml-devel-0:0.1.3-4.el6_6.i686", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.3-4.el6_6.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.ppc" }, "product_reference": "libyaml-devel-0:0.1.3-4.el6_6.ppc", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.3-4.el6_6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.ppc64" }, "product_reference": "libyaml-devel-0:0.1.3-4.el6_6.ppc64", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.3-4.el6_6.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.s390" }, "product_reference": "libyaml-devel-0:0.1.3-4.el6_6.s390", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.3-4.el6_6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.s390x" }, "product_reference": "libyaml-devel-0:0.1.3-4.el6_6.s390x", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.3-4.el6_6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.x86_64" }, "product_reference": "libyaml-devel-0:0.1.3-4.el6_6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.3-4.el6_6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:libyaml-0:0.1.3-4.el6_6.i686" }, "product_reference": "libyaml-0:0.1.3-4.el6_6.i686", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.3-4.el6_6.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:libyaml-0:0.1.3-4.el6_6.ppc" }, "product_reference": "libyaml-0:0.1.3-4.el6_6.ppc", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.3-4.el6_6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:libyaml-0:0.1.3-4.el6_6.ppc64" }, "product_reference": "libyaml-0:0.1.3-4.el6_6.ppc64", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.3-4.el6_6.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:libyaml-0:0.1.3-4.el6_6.s390" }, "product_reference": "libyaml-0:0.1.3-4.el6_6.s390", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.3-4.el6_6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:libyaml-0:0.1.3-4.el6_6.s390x" }, "product_reference": "libyaml-0:0.1.3-4.el6_6.s390x", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.3-4.el6_6.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:libyaml-0:0.1.3-4.el6_6.src" }, "product_reference": "libyaml-0:0.1.3-4.el6_6.src", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.3-4.el6_6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:libyaml-0:0.1.3-4.el6_6.x86_64" }, "product_reference": "libyaml-0:0.1.3-4.el6_6.x86_64", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.3-4.el6_6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.i686" }, "product_reference": "libyaml-debuginfo-0:0.1.3-4.el6_6.i686", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.3-4.el6_6.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.ppc" }, "product_reference": "libyaml-debuginfo-0:0.1.3-4.el6_6.ppc", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.3-4.el6_6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.ppc64" }, "product_reference": "libyaml-debuginfo-0:0.1.3-4.el6_6.ppc64", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.3-4.el6_6.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.s390" }, "product_reference": "libyaml-debuginfo-0:0.1.3-4.el6_6.s390", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.3-4.el6_6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.s390x" }, "product_reference": "libyaml-debuginfo-0:0.1.3-4.el6_6.s390x", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64" }, "product_reference": "libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.3-4.el6_6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.i686" }, "product_reference": "libyaml-devel-0:0.1.3-4.el6_6.i686", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.3-4.el6_6.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.ppc" }, "product_reference": "libyaml-devel-0:0.1.3-4.el6_6.ppc", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.3-4.el6_6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.ppc64" }, "product_reference": "libyaml-devel-0:0.1.3-4.el6_6.ppc64", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.3-4.el6_6.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.s390" }, "product_reference": "libyaml-devel-0:0.1.3-4.el6_6.s390", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.3-4.el6_6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.s390x" }, "product_reference": "libyaml-devel-0:0.1.3-4.el6_6.s390x", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.3-4.el6_6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.x86_64" }, "product_reference": "libyaml-devel-0:0.1.3-4.el6_6.x86_64", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.3-4.el6_6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.i686" }, "product_reference": "libyaml-0:0.1.3-4.el6_6.i686", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.3-4.el6_6.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.ppc" }, "product_reference": "libyaml-0:0.1.3-4.el6_6.ppc", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.3-4.el6_6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.ppc64" }, "product_reference": "libyaml-0:0.1.3-4.el6_6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.3-4.el6_6.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.s390" }, "product_reference": "libyaml-0:0.1.3-4.el6_6.s390", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.3-4.el6_6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.s390x" }, "product_reference": "libyaml-0:0.1.3-4.el6_6.s390x", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.3-4.el6_6.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.src" }, "product_reference": "libyaml-0:0.1.3-4.el6_6.src", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.3-4.el6_6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.x86_64" }, "product_reference": "libyaml-0:0.1.3-4.el6_6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.3-4.el6_6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.i686" }, "product_reference": "libyaml-debuginfo-0:0.1.3-4.el6_6.i686", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.3-4.el6_6.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.ppc" }, "product_reference": "libyaml-debuginfo-0:0.1.3-4.el6_6.ppc", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.3-4.el6_6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.ppc64" }, "product_reference": "libyaml-debuginfo-0:0.1.3-4.el6_6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.3-4.el6_6.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.s390" }, "product_reference": "libyaml-debuginfo-0:0.1.3-4.el6_6.s390", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.3-4.el6_6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.s390x" }, "product_reference": "libyaml-debuginfo-0:0.1.3-4.el6_6.s390x", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64" }, "product_reference": "libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.3-4.el6_6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.i686" }, "product_reference": "libyaml-devel-0:0.1.3-4.el6_6.i686", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.3-4.el6_6.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.ppc" }, "product_reference": "libyaml-devel-0:0.1.3-4.el6_6.ppc", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.3-4.el6_6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.ppc64" }, "product_reference": "libyaml-devel-0:0.1.3-4.el6_6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.3-4.el6_6.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.s390" }, "product_reference": "libyaml-devel-0:0.1.3-4.el6_6.s390", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.3-4.el6_6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.s390x" }, "product_reference": "libyaml-devel-0:0.1.3-4.el6_6.s390x", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.3-4.el6_6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.x86_64" }, "product_reference": "libyaml-devel-0:0.1.3-4.el6_6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.4-11.el7_0.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:libyaml-0:0.1.4-11.el7_0.i686" }, "product_reference": "libyaml-0:0.1.4-11.el7_0.i686", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.4-11.el7_0.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:libyaml-0:0.1.4-11.el7_0.ppc" }, "product_reference": "libyaml-0:0.1.4-11.el7_0.ppc", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.4-11.el7_0.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:libyaml-0:0.1.4-11.el7_0.ppc64" }, "product_reference": "libyaml-0:0.1.4-11.el7_0.ppc64", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.4-11.el7_0.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:libyaml-0:0.1.4-11.el7_0.s390" }, "product_reference": "libyaml-0:0.1.4-11.el7_0.s390", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.4-11.el7_0.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:libyaml-0:0.1.4-11.el7_0.s390x" }, "product_reference": "libyaml-0:0.1.4-11.el7_0.s390x", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.4-11.el7_0.src as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:libyaml-0:0.1.4-11.el7_0.src" }, "product_reference": "libyaml-0:0.1.4-11.el7_0.src", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.4-11.el7_0.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:libyaml-0:0.1.4-11.el7_0.x86_64" }, "product_reference": "libyaml-0:0.1.4-11.el7_0.x86_64", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.4-11.el7_0.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.i686" }, "product_reference": "libyaml-debuginfo-0:0.1.4-11.el7_0.i686", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.4-11.el7_0.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.ppc" }, "product_reference": "libyaml-debuginfo-0:0.1.4-11.el7_0.ppc", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.4-11.el7_0.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.ppc64" }, "product_reference": "libyaml-debuginfo-0:0.1.4-11.el7_0.ppc64", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.4-11.el7_0.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.s390" }, "product_reference": "libyaml-debuginfo-0:0.1.4-11.el7_0.s390", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.4-11.el7_0.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.s390x" }, "product_reference": "libyaml-debuginfo-0:0.1.4-11.el7_0.s390x", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.4-11.el7_0.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.x86_64" }, "product_reference": "libyaml-debuginfo-0:0.1.4-11.el7_0.x86_64", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.4-11.el7_0.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.i686" }, "product_reference": "libyaml-devel-0:0.1.4-11.el7_0.i686", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.4-11.el7_0.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.ppc" }, "product_reference": "libyaml-devel-0:0.1.4-11.el7_0.ppc", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.4-11.el7_0.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.ppc64" }, "product_reference": "libyaml-devel-0:0.1.4-11.el7_0.ppc64", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.4-11.el7_0.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.s390" }, "product_reference": "libyaml-devel-0:0.1.4-11.el7_0.s390", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.4-11.el7_0.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.s390x" }, "product_reference": "libyaml-devel-0:0.1.4-11.el7_0.s390x", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.4-11.el7_0.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.x86_64" }, "product_reference": "libyaml-devel-0:0.1.4-11.el7_0.x86_64", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.4-11.el7_0.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.i686" }, "product_reference": "libyaml-0:0.1.4-11.el7_0.i686", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.4-11.el7_0.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.ppc" }, "product_reference": "libyaml-0:0.1.4-11.el7_0.ppc", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.4-11.el7_0.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.ppc64" }, "product_reference": "libyaml-0:0.1.4-11.el7_0.ppc64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.4-11.el7_0.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.s390" }, "product_reference": "libyaml-0:0.1.4-11.el7_0.s390", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.4-11.el7_0.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.s390x" }, "product_reference": "libyaml-0:0.1.4-11.el7_0.s390x", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.4-11.el7_0.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.src" }, "product_reference": "libyaml-0:0.1.4-11.el7_0.src", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.4-11.el7_0.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.x86_64" }, "product_reference": "libyaml-0:0.1.4-11.el7_0.x86_64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.4-11.el7_0.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.i686" }, "product_reference": "libyaml-debuginfo-0:0.1.4-11.el7_0.i686", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.4-11.el7_0.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.ppc" }, "product_reference": "libyaml-debuginfo-0:0.1.4-11.el7_0.ppc", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.4-11.el7_0.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.ppc64" }, "product_reference": "libyaml-debuginfo-0:0.1.4-11.el7_0.ppc64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.4-11.el7_0.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.s390" }, "product_reference": "libyaml-debuginfo-0:0.1.4-11.el7_0.s390", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.4-11.el7_0.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.s390x" }, "product_reference": "libyaml-debuginfo-0:0.1.4-11.el7_0.s390x", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.4-11.el7_0.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.x86_64" }, "product_reference": "libyaml-debuginfo-0:0.1.4-11.el7_0.x86_64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.4-11.el7_0.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.i686" }, "product_reference": "libyaml-devel-0:0.1.4-11.el7_0.i686", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.4-11.el7_0.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.ppc" }, "product_reference": "libyaml-devel-0:0.1.4-11.el7_0.ppc", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.4-11.el7_0.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.ppc64" }, "product_reference": "libyaml-devel-0:0.1.4-11.el7_0.ppc64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.4-11.el7_0.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.s390" }, "product_reference": "libyaml-devel-0:0.1.4-11.el7_0.s390", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.4-11.el7_0.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.s390x" }, "product_reference": "libyaml-devel-0:0.1.4-11.el7_0.s390x", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.4-11.el7_0.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.x86_64" }, "product_reference": "libyaml-devel-0:0.1.4-11.el7_0.x86_64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.4-11.el7_0.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:libyaml-0:0.1.4-11.el7_0.i686" }, "product_reference": "libyaml-0:0.1.4-11.el7_0.i686", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.4-11.el7_0.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:libyaml-0:0.1.4-11.el7_0.ppc" }, "product_reference": "libyaml-0:0.1.4-11.el7_0.ppc", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.4-11.el7_0.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:libyaml-0:0.1.4-11.el7_0.ppc64" }, "product_reference": "libyaml-0:0.1.4-11.el7_0.ppc64", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.4-11.el7_0.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:libyaml-0:0.1.4-11.el7_0.s390" }, "product_reference": "libyaml-0:0.1.4-11.el7_0.s390", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.4-11.el7_0.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:libyaml-0:0.1.4-11.el7_0.s390x" }, "product_reference": "libyaml-0:0.1.4-11.el7_0.s390x", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.4-11.el7_0.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:libyaml-0:0.1.4-11.el7_0.src" }, "product_reference": "libyaml-0:0.1.4-11.el7_0.src", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.4-11.el7_0.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:libyaml-0:0.1.4-11.el7_0.x86_64" }, "product_reference": "libyaml-0:0.1.4-11.el7_0.x86_64", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.4-11.el7_0.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.i686" }, "product_reference": "libyaml-debuginfo-0:0.1.4-11.el7_0.i686", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.4-11.el7_0.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.ppc" }, "product_reference": "libyaml-debuginfo-0:0.1.4-11.el7_0.ppc", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.4-11.el7_0.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.ppc64" }, "product_reference": "libyaml-debuginfo-0:0.1.4-11.el7_0.ppc64", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.4-11.el7_0.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.s390" }, "product_reference": "libyaml-debuginfo-0:0.1.4-11.el7_0.s390", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.4-11.el7_0.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.s390x" }, "product_reference": "libyaml-debuginfo-0:0.1.4-11.el7_0.s390x", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.4-11.el7_0.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.x86_64" }, "product_reference": "libyaml-debuginfo-0:0.1.4-11.el7_0.x86_64", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.4-11.el7_0.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.i686" }, "product_reference": "libyaml-devel-0:0.1.4-11.el7_0.i686", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.4-11.el7_0.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.ppc" }, "product_reference": "libyaml-devel-0:0.1.4-11.el7_0.ppc", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.4-11.el7_0.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.ppc64" }, "product_reference": "libyaml-devel-0:0.1.4-11.el7_0.ppc64", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.4-11.el7_0.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.s390" }, "product_reference": "libyaml-devel-0:0.1.4-11.el7_0.s390", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.4-11.el7_0.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.s390x" }, "product_reference": "libyaml-devel-0:0.1.4-11.el7_0.s390x", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.4-11.el7_0.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.x86_64" }, "product_reference": "libyaml-devel-0:0.1.4-11.el7_0.x86_64", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.4-11.el7_0.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.i686" }, "product_reference": "libyaml-0:0.1.4-11.el7_0.i686", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.4-11.el7_0.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.ppc" }, "product_reference": "libyaml-0:0.1.4-11.el7_0.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.4-11.el7_0.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.ppc64" }, "product_reference": "libyaml-0:0.1.4-11.el7_0.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.4-11.el7_0.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.s390" }, "product_reference": "libyaml-0:0.1.4-11.el7_0.s390", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.4-11.el7_0.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.s390x" }, "product_reference": "libyaml-0:0.1.4-11.el7_0.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.4-11.el7_0.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.src" }, "product_reference": "libyaml-0:0.1.4-11.el7_0.src", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.4-11.el7_0.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.x86_64" }, "product_reference": "libyaml-0:0.1.4-11.el7_0.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.4-11.el7_0.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.i686" }, "product_reference": "libyaml-debuginfo-0:0.1.4-11.el7_0.i686", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.4-11.el7_0.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.ppc" }, "product_reference": "libyaml-debuginfo-0:0.1.4-11.el7_0.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.4-11.el7_0.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.ppc64" }, "product_reference": "libyaml-debuginfo-0:0.1.4-11.el7_0.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.4-11.el7_0.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.s390" }, "product_reference": "libyaml-debuginfo-0:0.1.4-11.el7_0.s390", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.4-11.el7_0.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.s390x" }, "product_reference": "libyaml-debuginfo-0:0.1.4-11.el7_0.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.4-11.el7_0.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.x86_64" }, "product_reference": "libyaml-debuginfo-0:0.1.4-11.el7_0.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.4-11.el7_0.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.i686" }, "product_reference": "libyaml-devel-0:0.1.4-11.el7_0.i686", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.4-11.el7_0.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.ppc" }, "product_reference": "libyaml-devel-0:0.1.4-11.el7_0.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.4-11.el7_0.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.ppc64" }, "product_reference": "libyaml-devel-0:0.1.4-11.el7_0.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.4-11.el7_0.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.s390" }, "product_reference": "libyaml-devel-0:0.1.4-11.el7_0.s390", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.4-11.el7_0.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.s390x" }, "product_reference": "libyaml-devel-0:0.1.4-11.el7_0.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.4-11.el7_0.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.x86_64" }, "product_reference": "libyaml-devel-0:0.1.4-11.el7_0.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.4-11.el7_0.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:libyaml-0:0.1.4-11.el7_0.i686" }, "product_reference": "libyaml-0:0.1.4-11.el7_0.i686", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.4-11.el7_0.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:libyaml-0:0.1.4-11.el7_0.ppc" }, "product_reference": "libyaml-0:0.1.4-11.el7_0.ppc", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.4-11.el7_0.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:libyaml-0:0.1.4-11.el7_0.ppc64" }, "product_reference": "libyaml-0:0.1.4-11.el7_0.ppc64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.4-11.el7_0.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:libyaml-0:0.1.4-11.el7_0.s390" }, "product_reference": "libyaml-0:0.1.4-11.el7_0.s390", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.4-11.el7_0.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:libyaml-0:0.1.4-11.el7_0.s390x" }, "product_reference": "libyaml-0:0.1.4-11.el7_0.s390x", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.4-11.el7_0.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:libyaml-0:0.1.4-11.el7_0.src" }, "product_reference": "libyaml-0:0.1.4-11.el7_0.src", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.4-11.el7_0.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:libyaml-0:0.1.4-11.el7_0.x86_64" }, "product_reference": "libyaml-0:0.1.4-11.el7_0.x86_64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.4-11.el7_0.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.i686" }, "product_reference": "libyaml-debuginfo-0:0.1.4-11.el7_0.i686", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.4-11.el7_0.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.ppc" }, "product_reference": "libyaml-debuginfo-0:0.1.4-11.el7_0.ppc", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.4-11.el7_0.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.ppc64" }, "product_reference": "libyaml-debuginfo-0:0.1.4-11.el7_0.ppc64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.4-11.el7_0.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.s390" }, "product_reference": "libyaml-debuginfo-0:0.1.4-11.el7_0.s390", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.4-11.el7_0.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.s390x" }, "product_reference": "libyaml-debuginfo-0:0.1.4-11.el7_0.s390x", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.4-11.el7_0.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.x86_64" }, "product_reference": "libyaml-debuginfo-0:0.1.4-11.el7_0.x86_64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.4-11.el7_0.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.i686" }, "product_reference": "libyaml-devel-0:0.1.4-11.el7_0.i686", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.4-11.el7_0.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.ppc" }, "product_reference": "libyaml-devel-0:0.1.4-11.el7_0.ppc", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.4-11.el7_0.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.ppc64" }, "product_reference": "libyaml-devel-0:0.1.4-11.el7_0.ppc64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.4-11.el7_0.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.s390" }, "product_reference": "libyaml-devel-0:0.1.4-11.el7_0.s390", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.4-11.el7_0.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.s390x" }, "product_reference": "libyaml-devel-0:0.1.4-11.el7_0.s390x", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.4-11.el7_0.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.x86_64" }, "product_reference": "libyaml-devel-0:0.1.4-11.el7_0.x86_64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.4-11.el7_0.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.i686" }, "product_reference": "libyaml-0:0.1.4-11.el7_0.i686", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.4-11.el7_0.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.ppc" }, "product_reference": "libyaml-0:0.1.4-11.el7_0.ppc", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.4-11.el7_0.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.ppc64" }, "product_reference": "libyaml-0:0.1.4-11.el7_0.ppc64", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.4-11.el7_0.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.s390" }, "product_reference": "libyaml-0:0.1.4-11.el7_0.s390", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.4-11.el7_0.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.s390x" }, "product_reference": "libyaml-0:0.1.4-11.el7_0.s390x", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.4-11.el7_0.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.src" }, "product_reference": "libyaml-0:0.1.4-11.el7_0.src", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.4-11.el7_0.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.x86_64" }, "product_reference": "libyaml-0:0.1.4-11.el7_0.x86_64", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.4-11.el7_0.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.i686" }, "product_reference": "libyaml-debuginfo-0:0.1.4-11.el7_0.i686", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.4-11.el7_0.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.ppc" }, "product_reference": "libyaml-debuginfo-0:0.1.4-11.el7_0.ppc", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.4-11.el7_0.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.ppc64" }, "product_reference": "libyaml-debuginfo-0:0.1.4-11.el7_0.ppc64", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.4-11.el7_0.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.s390" }, "product_reference": "libyaml-debuginfo-0:0.1.4-11.el7_0.s390", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.4-11.el7_0.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.s390x" }, "product_reference": "libyaml-debuginfo-0:0.1.4-11.el7_0.s390x", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.4-11.el7_0.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.x86_64" }, "product_reference": "libyaml-debuginfo-0:0.1.4-11.el7_0.x86_64", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.4-11.el7_0.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.i686" }, "product_reference": "libyaml-devel-0:0.1.4-11.el7_0.i686", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.4-11.el7_0.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.ppc" }, "product_reference": "libyaml-devel-0:0.1.4-11.el7_0.ppc", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.4-11.el7_0.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.ppc64" }, "product_reference": "libyaml-devel-0:0.1.4-11.el7_0.ppc64", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.4-11.el7_0.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.s390" }, "product_reference": "libyaml-devel-0:0.1.4-11.el7_0.s390", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.4-11.el7_0.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.s390x" }, "product_reference": "libyaml-devel-0:0.1.4-11.el7_0.s390x", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.4-11.el7_0.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.x86_64" }, "product_reference": "libyaml-devel-0:0.1.4-11.el7_0.x86_64", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.4-11.el7_0.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:libyaml-0:0.1.4-11.el7_0.i686" }, "product_reference": "libyaml-0:0.1.4-11.el7_0.i686", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.4-11.el7_0.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:libyaml-0:0.1.4-11.el7_0.ppc" }, "product_reference": "libyaml-0:0.1.4-11.el7_0.ppc", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.4-11.el7_0.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:libyaml-0:0.1.4-11.el7_0.ppc64" }, "product_reference": "libyaml-0:0.1.4-11.el7_0.ppc64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.4-11.el7_0.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:libyaml-0:0.1.4-11.el7_0.s390" }, "product_reference": "libyaml-0:0.1.4-11.el7_0.s390", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.4-11.el7_0.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:libyaml-0:0.1.4-11.el7_0.s390x" }, "product_reference": "libyaml-0:0.1.4-11.el7_0.s390x", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.4-11.el7_0.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:libyaml-0:0.1.4-11.el7_0.src" }, "product_reference": "libyaml-0:0.1.4-11.el7_0.src", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.4-11.el7_0.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:libyaml-0:0.1.4-11.el7_0.x86_64" }, "product_reference": "libyaml-0:0.1.4-11.el7_0.x86_64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.4-11.el7_0.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.i686" }, "product_reference": "libyaml-debuginfo-0:0.1.4-11.el7_0.i686", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.4-11.el7_0.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.ppc" }, "product_reference": "libyaml-debuginfo-0:0.1.4-11.el7_0.ppc", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.4-11.el7_0.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.ppc64" }, "product_reference": "libyaml-debuginfo-0:0.1.4-11.el7_0.ppc64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.4-11.el7_0.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.s390" }, "product_reference": "libyaml-debuginfo-0:0.1.4-11.el7_0.s390", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.4-11.el7_0.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.s390x" }, "product_reference": "libyaml-debuginfo-0:0.1.4-11.el7_0.s390x", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.4-11.el7_0.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.x86_64" }, "product_reference": "libyaml-debuginfo-0:0.1.4-11.el7_0.x86_64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.4-11.el7_0.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.i686" }, "product_reference": "libyaml-devel-0:0.1.4-11.el7_0.i686", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.4-11.el7_0.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.ppc" }, "product_reference": "libyaml-devel-0:0.1.4-11.el7_0.ppc", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.4-11.el7_0.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.ppc64" }, "product_reference": "libyaml-devel-0:0.1.4-11.el7_0.ppc64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.4-11.el7_0.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.s390" }, "product_reference": "libyaml-devel-0:0.1.4-11.el7_0.s390", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.4-11.el7_0.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.s390x" }, "product_reference": "libyaml-devel-0:0.1.4-11.el7_0.s390x", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.4-11.el7_0.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.x86_64" }, "product_reference": "libyaml-devel-0:0.1.4-11.el7_0.x86_64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.4-11.el7_0.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.i686" }, "product_reference": "libyaml-0:0.1.4-11.el7_0.i686", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.4-11.el7_0.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.ppc" }, "product_reference": "libyaml-0:0.1.4-11.el7_0.ppc", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.4-11.el7_0.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.ppc64" }, "product_reference": "libyaml-0:0.1.4-11.el7_0.ppc64", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.4-11.el7_0.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.s390" }, "product_reference": "libyaml-0:0.1.4-11.el7_0.s390", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.4-11.el7_0.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.s390x" }, "product_reference": "libyaml-0:0.1.4-11.el7_0.s390x", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.4-11.el7_0.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.src" }, "product_reference": "libyaml-0:0.1.4-11.el7_0.src", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.4-11.el7_0.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.x86_64" }, "product_reference": "libyaml-0:0.1.4-11.el7_0.x86_64", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.4-11.el7_0.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.i686" }, "product_reference": "libyaml-debuginfo-0:0.1.4-11.el7_0.i686", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.4-11.el7_0.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.ppc" }, "product_reference": "libyaml-debuginfo-0:0.1.4-11.el7_0.ppc", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.4-11.el7_0.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.ppc64" }, "product_reference": "libyaml-debuginfo-0:0.1.4-11.el7_0.ppc64", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.4-11.el7_0.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.s390" }, "product_reference": "libyaml-debuginfo-0:0.1.4-11.el7_0.s390", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.4-11.el7_0.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.s390x" }, "product_reference": "libyaml-debuginfo-0:0.1.4-11.el7_0.s390x", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.4-11.el7_0.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.x86_64" }, "product_reference": "libyaml-debuginfo-0:0.1.4-11.el7_0.x86_64", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.4-11.el7_0.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.i686" }, "product_reference": "libyaml-devel-0:0.1.4-11.el7_0.i686", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.4-11.el7_0.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.ppc" }, "product_reference": "libyaml-devel-0:0.1.4-11.el7_0.ppc", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.4-11.el7_0.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.ppc64" }, "product_reference": "libyaml-devel-0:0.1.4-11.el7_0.ppc64", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.4-11.el7_0.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.s390" }, "product_reference": "libyaml-devel-0:0.1.4-11.el7_0.s390", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.4-11.el7_0.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.s390x" }, "product_reference": "libyaml-devel-0:0.1.4-11.el7_0.s390x", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.4-11.el7_0.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.x86_64" }, "product_reference": "libyaml-devel-0:0.1.4-11.el7_0.x86_64", "relates_to_product_reference": "7Workstation-optional-7.0.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2014-9130", "cwe": { "id": "CWE-617", "name": "Reachable Assertion" }, "discovery_date": "2014-12-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1169369" } ], "notes": [ { "category": "description", "text": "An assertion failure was found in the way the libyaml library parsed wrapped strings. An attacker able to load specially crafted YAML input into an application using libyaml could cause the application to crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "libyaml: assert failure when processing wrapped strings", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.6.z:libyaml-0:0.1.3-4.el6_6.i686", "6Client-6.6.z:libyaml-0:0.1.3-4.el6_6.ppc", "6Client-6.6.z:libyaml-0:0.1.3-4.el6_6.ppc64", "6Client-6.6.z:libyaml-0:0.1.3-4.el6_6.s390", "6Client-6.6.z:libyaml-0:0.1.3-4.el6_6.s390x", "6Client-6.6.z:libyaml-0:0.1.3-4.el6_6.src", "6Client-6.6.z:libyaml-0:0.1.3-4.el6_6.x86_64", "6Client-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.i686", "6Client-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.ppc", "6Client-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.ppc64", "6Client-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.s390", "6Client-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.s390x", "6Client-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64", "6Client-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.i686", "6Client-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.ppc", "6Client-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.ppc64", "6Client-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.s390", "6Client-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.s390x", "6Client-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.x86_64", "6Client-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.i686", "6Client-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.ppc", "6Client-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.ppc64", "6Client-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.s390", "6Client-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.s390x", "6Client-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.src", "6Client-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.x86_64", "6Client-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.i686", "6Client-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.ppc", "6Client-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.ppc64", "6Client-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.s390", "6Client-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.s390x", "6Client-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64", "6Client-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.i686", "6Client-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.ppc", "6Client-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.ppc64", "6Client-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.s390", "6Client-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.s390x", "6Client-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.x86_64", "6ComputeNode-6.6.z:libyaml-0:0.1.3-4.el6_6.i686", "6ComputeNode-6.6.z:libyaml-0:0.1.3-4.el6_6.ppc", "6ComputeNode-6.6.z:libyaml-0:0.1.3-4.el6_6.ppc64", "6ComputeNode-6.6.z:libyaml-0:0.1.3-4.el6_6.s390", "6ComputeNode-6.6.z:libyaml-0:0.1.3-4.el6_6.s390x", "6ComputeNode-6.6.z:libyaml-0:0.1.3-4.el6_6.src", "6ComputeNode-6.6.z:libyaml-0:0.1.3-4.el6_6.x86_64", "6ComputeNode-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.i686", "6ComputeNode-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.ppc", "6ComputeNode-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.ppc64", "6ComputeNode-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.s390", "6ComputeNode-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.s390x", "6ComputeNode-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64", "6ComputeNode-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.i686", "6ComputeNode-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.ppc", "6ComputeNode-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.ppc64", "6ComputeNode-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.s390", "6ComputeNode-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.s390x", "6ComputeNode-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.x86_64", "6ComputeNode-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.i686", "6ComputeNode-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.ppc", "6ComputeNode-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.ppc64", "6ComputeNode-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.s390", "6ComputeNode-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.s390x", "6ComputeNode-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.src", "6ComputeNode-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.x86_64", "6ComputeNode-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.i686", "6ComputeNode-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.ppc", "6ComputeNode-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.ppc64", "6ComputeNode-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.s390", "6ComputeNode-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.s390x", "6ComputeNode-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64", "6ComputeNode-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.i686", "6ComputeNode-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.ppc", "6ComputeNode-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.ppc64", "6ComputeNode-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.s390", "6ComputeNode-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.s390x", "6ComputeNode-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.x86_64", "6Server-6.6.z:libyaml-0:0.1.3-4.el6_6.i686", "6Server-6.6.z:libyaml-0:0.1.3-4.el6_6.ppc", "6Server-6.6.z:libyaml-0:0.1.3-4.el6_6.ppc64", "6Server-6.6.z:libyaml-0:0.1.3-4.el6_6.s390", "6Server-6.6.z:libyaml-0:0.1.3-4.el6_6.s390x", "6Server-6.6.z:libyaml-0:0.1.3-4.el6_6.src", "6Server-6.6.z:libyaml-0:0.1.3-4.el6_6.x86_64", "6Server-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.i686", "6Server-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.ppc", "6Server-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.ppc64", "6Server-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.s390", "6Server-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.s390x", "6Server-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64", "6Server-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.i686", "6Server-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.ppc", "6Server-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.ppc64", "6Server-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.s390", "6Server-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.s390x", "6Server-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.x86_64", "6Server-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.i686", "6Server-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.ppc", "6Server-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.ppc64", "6Server-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.s390", "6Server-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.s390x", "6Server-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.src", "6Server-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.x86_64", "6Server-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.i686", "6Server-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.ppc", "6Server-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.ppc64", "6Server-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.s390", "6Server-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.s390x", "6Server-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64", "6Server-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.i686", "6Server-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.ppc", "6Server-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.ppc64", "6Server-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.s390", "6Server-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.s390x", "6Server-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.x86_64", "6Workstation-6.6.z:libyaml-0:0.1.3-4.el6_6.i686", "6Workstation-6.6.z:libyaml-0:0.1.3-4.el6_6.ppc", "6Workstation-6.6.z:libyaml-0:0.1.3-4.el6_6.ppc64", "6Workstation-6.6.z:libyaml-0:0.1.3-4.el6_6.s390", "6Workstation-6.6.z:libyaml-0:0.1.3-4.el6_6.s390x", "6Workstation-6.6.z:libyaml-0:0.1.3-4.el6_6.src", "6Workstation-6.6.z:libyaml-0:0.1.3-4.el6_6.x86_64", "6Workstation-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.i686", "6Workstation-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.ppc", "6Workstation-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.ppc64", "6Workstation-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.s390", "6Workstation-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.s390x", "6Workstation-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64", "6Workstation-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.i686", "6Workstation-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.ppc", "6Workstation-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.ppc64", "6Workstation-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.s390", "6Workstation-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.s390x", "6Workstation-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.x86_64", "6Workstation-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.i686", "6Workstation-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.ppc", "6Workstation-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.ppc64", "6Workstation-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.s390", "6Workstation-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.s390x", "6Workstation-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.src", "6Workstation-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.x86_64", "6Workstation-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.i686", "6Workstation-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.ppc", "6Workstation-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.ppc64", "6Workstation-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.s390", "6Workstation-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.s390x", "6Workstation-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64", "6Workstation-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.i686", "6Workstation-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.ppc", "6Workstation-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.ppc64", "6Workstation-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.s390", "6Workstation-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.s390x", "6Workstation-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.x86_64", "7Client-7.0.Z:libyaml-0:0.1.4-11.el7_0.i686", "7Client-7.0.Z:libyaml-0:0.1.4-11.el7_0.ppc", "7Client-7.0.Z:libyaml-0:0.1.4-11.el7_0.ppc64", "7Client-7.0.Z:libyaml-0:0.1.4-11.el7_0.s390", "7Client-7.0.Z:libyaml-0:0.1.4-11.el7_0.s390x", "7Client-7.0.Z:libyaml-0:0.1.4-11.el7_0.src", "7Client-7.0.Z:libyaml-0:0.1.4-11.el7_0.x86_64", "7Client-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.i686", "7Client-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.ppc", "7Client-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.ppc64", "7Client-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.s390", "7Client-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.s390x", "7Client-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.x86_64", "7Client-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.i686", "7Client-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.ppc", "7Client-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.ppc64", "7Client-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.s390", "7Client-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.s390x", "7Client-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.x86_64", "7Client-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.i686", "7Client-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.ppc", "7Client-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.ppc64", "7Client-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.s390", "7Client-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.s390x", "7Client-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.src", "7Client-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.x86_64", "7Client-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.i686", "7Client-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.ppc", "7Client-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.ppc64", "7Client-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.s390", "7Client-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.s390x", "7Client-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.x86_64", "7Client-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.i686", "7Client-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.ppc", "7Client-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.ppc64", "7Client-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.s390", "7Client-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.s390x", "7Client-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.x86_64", "7ComputeNode-7.0.Z:libyaml-0:0.1.4-11.el7_0.i686", "7ComputeNode-7.0.Z:libyaml-0:0.1.4-11.el7_0.ppc", "7ComputeNode-7.0.Z:libyaml-0:0.1.4-11.el7_0.ppc64", "7ComputeNode-7.0.Z:libyaml-0:0.1.4-11.el7_0.s390", "7ComputeNode-7.0.Z:libyaml-0:0.1.4-11.el7_0.s390x", "7ComputeNode-7.0.Z:libyaml-0:0.1.4-11.el7_0.src", "7ComputeNode-7.0.Z:libyaml-0:0.1.4-11.el7_0.x86_64", "7ComputeNode-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.i686", "7ComputeNode-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.ppc", "7ComputeNode-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.ppc64", "7ComputeNode-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.s390", "7ComputeNode-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.s390x", "7ComputeNode-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.x86_64", "7ComputeNode-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.i686", "7ComputeNode-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.ppc", "7ComputeNode-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.ppc64", "7ComputeNode-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.s390", "7ComputeNode-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.s390x", "7ComputeNode-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.i686", "7ComputeNode-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.ppc", "7ComputeNode-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.s390", "7ComputeNode-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.s390x", "7ComputeNode-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.src", "7ComputeNode-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.i686", "7ComputeNode-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.ppc", "7ComputeNode-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.s390", "7ComputeNode-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.s390x", "7ComputeNode-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.i686", "7ComputeNode-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.ppc", "7ComputeNode-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.s390", "7ComputeNode-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.s390x", "7ComputeNode-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.x86_64", "7Server-7.0.Z:libyaml-0:0.1.4-11.el7_0.i686", "7Server-7.0.Z:libyaml-0:0.1.4-11.el7_0.ppc", "7Server-7.0.Z:libyaml-0:0.1.4-11.el7_0.ppc64", "7Server-7.0.Z:libyaml-0:0.1.4-11.el7_0.s390", "7Server-7.0.Z:libyaml-0:0.1.4-11.el7_0.s390x", "7Server-7.0.Z:libyaml-0:0.1.4-11.el7_0.src", "7Server-7.0.Z:libyaml-0:0.1.4-11.el7_0.x86_64", "7Server-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.i686", "7Server-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.ppc", "7Server-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.ppc64", "7Server-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.s390", "7Server-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.s390x", "7Server-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.x86_64", "7Server-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.i686", "7Server-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.ppc", "7Server-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.ppc64", "7Server-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.s390", "7Server-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.s390x", "7Server-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.x86_64", "7Server-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.i686", "7Server-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.ppc", "7Server-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.ppc64", "7Server-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.s390", "7Server-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.s390x", "7Server-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.src", "7Server-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.x86_64", "7Server-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.i686", "7Server-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.ppc", "7Server-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.ppc64", "7Server-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.s390", "7Server-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.s390x", "7Server-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.x86_64", "7Server-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.i686", "7Server-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.ppc", "7Server-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.ppc64", "7Server-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.s390", "7Server-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.s390x", "7Server-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.x86_64", "7Workstation-7.0.Z:libyaml-0:0.1.4-11.el7_0.i686", "7Workstation-7.0.Z:libyaml-0:0.1.4-11.el7_0.ppc", "7Workstation-7.0.Z:libyaml-0:0.1.4-11.el7_0.ppc64", "7Workstation-7.0.Z:libyaml-0:0.1.4-11.el7_0.s390", "7Workstation-7.0.Z:libyaml-0:0.1.4-11.el7_0.s390x", "7Workstation-7.0.Z:libyaml-0:0.1.4-11.el7_0.src", "7Workstation-7.0.Z:libyaml-0:0.1.4-11.el7_0.x86_64", "7Workstation-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.i686", "7Workstation-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.ppc", "7Workstation-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.ppc64", "7Workstation-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.s390", "7Workstation-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.s390x", "7Workstation-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.x86_64", "7Workstation-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.i686", "7Workstation-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.ppc", "7Workstation-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.ppc64", "7Workstation-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.s390", "7Workstation-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.s390x", "7Workstation-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.x86_64", "7Workstation-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.i686", "7Workstation-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.ppc", "7Workstation-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.ppc64", "7Workstation-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.s390", "7Workstation-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.s390x", "7Workstation-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.src", "7Workstation-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.x86_64", "7Workstation-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.i686", "7Workstation-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.ppc", "7Workstation-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.ppc64", "7Workstation-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.s390", "7Workstation-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.s390x", "7Workstation-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.x86_64", "7Workstation-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.i686", "7Workstation-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.ppc", "7Workstation-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.ppc64", "7Workstation-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.s390", "7Workstation-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.s390x", "7Workstation-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-9130" }, { "category": "external", "summary": "RHBZ#1169369", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1169369" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-9130", "url": "https://www.cve.org/CVERecord?id=CVE-2014-9130" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-9130", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-9130" } ], "release_date": "2014-11-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-01-28T17:35:23+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-6.6.z:libyaml-0:0.1.3-4.el6_6.i686", "6Client-6.6.z:libyaml-0:0.1.3-4.el6_6.ppc", "6Client-6.6.z:libyaml-0:0.1.3-4.el6_6.ppc64", "6Client-6.6.z:libyaml-0:0.1.3-4.el6_6.s390", "6Client-6.6.z:libyaml-0:0.1.3-4.el6_6.s390x", "6Client-6.6.z:libyaml-0:0.1.3-4.el6_6.src", "6Client-6.6.z:libyaml-0:0.1.3-4.el6_6.x86_64", "6Client-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.i686", "6Client-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.ppc", "6Client-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.ppc64", "6Client-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.s390", "6Client-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.s390x", "6Client-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64", "6Client-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.i686", "6Client-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.ppc", "6Client-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.ppc64", "6Client-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.s390", "6Client-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.s390x", "6Client-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.x86_64", "6Client-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.i686", "6Client-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.ppc", "6Client-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.ppc64", "6Client-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.s390", "6Client-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.s390x", "6Client-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.src", "6Client-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.x86_64", "6Client-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.i686", "6Client-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.ppc", "6Client-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.ppc64", "6Client-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.s390", "6Client-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.s390x", "6Client-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64", "6Client-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.i686", "6Client-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.ppc", "6Client-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.ppc64", "6Client-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.s390", "6Client-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.s390x", "6Client-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.x86_64", "6ComputeNode-6.6.z:libyaml-0:0.1.3-4.el6_6.i686", "6ComputeNode-6.6.z:libyaml-0:0.1.3-4.el6_6.ppc", "6ComputeNode-6.6.z:libyaml-0:0.1.3-4.el6_6.ppc64", "6ComputeNode-6.6.z:libyaml-0:0.1.3-4.el6_6.s390", "6ComputeNode-6.6.z:libyaml-0:0.1.3-4.el6_6.s390x", "6ComputeNode-6.6.z:libyaml-0:0.1.3-4.el6_6.src", "6ComputeNode-6.6.z:libyaml-0:0.1.3-4.el6_6.x86_64", "6ComputeNode-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.i686", "6ComputeNode-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.ppc", "6ComputeNode-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.ppc64", "6ComputeNode-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.s390", "6ComputeNode-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.s390x", "6ComputeNode-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64", "6ComputeNode-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.i686", "6ComputeNode-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.ppc", "6ComputeNode-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.ppc64", "6ComputeNode-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.s390", "6ComputeNode-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.s390x", "6ComputeNode-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.x86_64", "6ComputeNode-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.i686", "6ComputeNode-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.ppc", "6ComputeNode-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.ppc64", "6ComputeNode-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.s390", "6ComputeNode-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.s390x", "6ComputeNode-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.src", "6ComputeNode-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.x86_64", "6ComputeNode-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.i686", "6ComputeNode-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.ppc", "6ComputeNode-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.ppc64", "6ComputeNode-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.s390", "6ComputeNode-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.s390x", "6ComputeNode-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64", "6ComputeNode-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.i686", "6ComputeNode-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.ppc", "6ComputeNode-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.ppc64", "6ComputeNode-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.s390", "6ComputeNode-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.s390x", "6ComputeNode-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.x86_64", "6Server-6.6.z:libyaml-0:0.1.3-4.el6_6.i686", "6Server-6.6.z:libyaml-0:0.1.3-4.el6_6.ppc", "6Server-6.6.z:libyaml-0:0.1.3-4.el6_6.ppc64", "6Server-6.6.z:libyaml-0:0.1.3-4.el6_6.s390", "6Server-6.6.z:libyaml-0:0.1.3-4.el6_6.s390x", "6Server-6.6.z:libyaml-0:0.1.3-4.el6_6.src", "6Server-6.6.z:libyaml-0:0.1.3-4.el6_6.x86_64", "6Server-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.i686", "6Server-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.ppc", "6Server-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.ppc64", "6Server-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.s390", "6Server-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.s390x", "6Server-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64", "6Server-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.i686", "6Server-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.ppc", "6Server-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.ppc64", "6Server-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.s390", "6Server-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.s390x", "6Server-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.x86_64", "6Server-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.i686", "6Server-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.ppc", "6Server-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.ppc64", "6Server-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.s390", "6Server-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.s390x", "6Server-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.src", "6Server-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.x86_64", "6Server-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.i686", "6Server-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.ppc", "6Server-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.ppc64", "6Server-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.s390", "6Server-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.s390x", "6Server-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64", "6Server-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.i686", "6Server-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.ppc", "6Server-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.ppc64", "6Server-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.s390", "6Server-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.s390x", "6Server-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.x86_64", "6Workstation-6.6.z:libyaml-0:0.1.3-4.el6_6.i686", "6Workstation-6.6.z:libyaml-0:0.1.3-4.el6_6.ppc", "6Workstation-6.6.z:libyaml-0:0.1.3-4.el6_6.ppc64", "6Workstation-6.6.z:libyaml-0:0.1.3-4.el6_6.s390", "6Workstation-6.6.z:libyaml-0:0.1.3-4.el6_6.s390x", "6Workstation-6.6.z:libyaml-0:0.1.3-4.el6_6.src", "6Workstation-6.6.z:libyaml-0:0.1.3-4.el6_6.x86_64", "6Workstation-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.i686", "6Workstation-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.ppc", "6Workstation-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.ppc64", "6Workstation-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.s390", "6Workstation-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.s390x", "6Workstation-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64", "6Workstation-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.i686", "6Workstation-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.ppc", "6Workstation-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.ppc64", "6Workstation-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.s390", "6Workstation-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.s390x", "6Workstation-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.x86_64", "6Workstation-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.i686", "6Workstation-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.ppc", "6Workstation-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.ppc64", "6Workstation-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.s390", "6Workstation-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.s390x", "6Workstation-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.src", "6Workstation-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.x86_64", "6Workstation-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.i686", "6Workstation-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.ppc", "6Workstation-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.ppc64", "6Workstation-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.s390", "6Workstation-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.s390x", "6Workstation-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64", "6Workstation-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.i686", "6Workstation-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.ppc", "6Workstation-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.ppc64", "6Workstation-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.s390", "6Workstation-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.s390x", "6Workstation-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.x86_64", "7Client-7.0.Z:libyaml-0:0.1.4-11.el7_0.i686", "7Client-7.0.Z:libyaml-0:0.1.4-11.el7_0.ppc", "7Client-7.0.Z:libyaml-0:0.1.4-11.el7_0.ppc64", "7Client-7.0.Z:libyaml-0:0.1.4-11.el7_0.s390", "7Client-7.0.Z:libyaml-0:0.1.4-11.el7_0.s390x", "7Client-7.0.Z:libyaml-0:0.1.4-11.el7_0.src", "7Client-7.0.Z:libyaml-0:0.1.4-11.el7_0.x86_64", "7Client-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.i686", "7Client-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.ppc", "7Client-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.ppc64", "7Client-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.s390", "7Client-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.s390x", "7Client-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.x86_64", "7Client-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.i686", "7Client-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.ppc", "7Client-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.ppc64", "7Client-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.s390", "7Client-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.s390x", "7Client-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.x86_64", "7Client-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.i686", "7Client-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.ppc", "7Client-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.ppc64", "7Client-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.s390", "7Client-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.s390x", "7Client-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.src", "7Client-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.x86_64", "7Client-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.i686", "7Client-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.ppc", "7Client-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.ppc64", "7Client-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.s390", "7Client-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.s390x", "7Client-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.x86_64", "7Client-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.i686", "7Client-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.ppc", "7Client-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.ppc64", "7Client-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.s390", "7Client-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.s390x", "7Client-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.x86_64", "7ComputeNode-7.0.Z:libyaml-0:0.1.4-11.el7_0.i686", "7ComputeNode-7.0.Z:libyaml-0:0.1.4-11.el7_0.ppc", "7ComputeNode-7.0.Z:libyaml-0:0.1.4-11.el7_0.ppc64", "7ComputeNode-7.0.Z:libyaml-0:0.1.4-11.el7_0.s390", "7ComputeNode-7.0.Z:libyaml-0:0.1.4-11.el7_0.s390x", "7ComputeNode-7.0.Z:libyaml-0:0.1.4-11.el7_0.src", "7ComputeNode-7.0.Z:libyaml-0:0.1.4-11.el7_0.x86_64", "7ComputeNode-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.i686", "7ComputeNode-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.ppc", "7ComputeNode-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.ppc64", "7ComputeNode-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.s390", "7ComputeNode-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.s390x", "7ComputeNode-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.x86_64", "7ComputeNode-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.i686", "7ComputeNode-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.ppc", "7ComputeNode-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.ppc64", "7ComputeNode-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.s390", "7ComputeNode-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.s390x", "7ComputeNode-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.i686", "7ComputeNode-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.ppc", "7ComputeNode-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.s390", "7ComputeNode-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.s390x", "7ComputeNode-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.src", "7ComputeNode-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.i686", "7ComputeNode-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.ppc", "7ComputeNode-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.s390", "7ComputeNode-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.s390x", "7ComputeNode-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.i686", "7ComputeNode-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.ppc", "7ComputeNode-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.s390", "7ComputeNode-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.s390x", "7ComputeNode-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.x86_64", "7Server-7.0.Z:libyaml-0:0.1.4-11.el7_0.i686", "7Server-7.0.Z:libyaml-0:0.1.4-11.el7_0.ppc", "7Server-7.0.Z:libyaml-0:0.1.4-11.el7_0.ppc64", "7Server-7.0.Z:libyaml-0:0.1.4-11.el7_0.s390", "7Server-7.0.Z:libyaml-0:0.1.4-11.el7_0.s390x", "7Server-7.0.Z:libyaml-0:0.1.4-11.el7_0.src", "7Server-7.0.Z:libyaml-0:0.1.4-11.el7_0.x86_64", "7Server-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.i686", "7Server-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.ppc", "7Server-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.ppc64", "7Server-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.s390", "7Server-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.s390x", "7Server-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.x86_64", "7Server-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.i686", "7Server-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.ppc", "7Server-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.ppc64", "7Server-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.s390", "7Server-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.s390x", "7Server-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.x86_64", "7Server-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.i686", "7Server-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.ppc", "7Server-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.ppc64", "7Server-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.s390", "7Server-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.s390x", "7Server-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.src", "7Server-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.x86_64", "7Server-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.i686", "7Server-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.ppc", "7Server-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.ppc64", "7Server-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.s390", "7Server-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.s390x", "7Server-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.x86_64", "7Server-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.i686", "7Server-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.ppc", "7Server-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.ppc64", "7Server-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.s390", "7Server-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.s390x", "7Server-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.x86_64", "7Workstation-7.0.Z:libyaml-0:0.1.4-11.el7_0.i686", "7Workstation-7.0.Z:libyaml-0:0.1.4-11.el7_0.ppc", "7Workstation-7.0.Z:libyaml-0:0.1.4-11.el7_0.ppc64", "7Workstation-7.0.Z:libyaml-0:0.1.4-11.el7_0.s390", "7Workstation-7.0.Z:libyaml-0:0.1.4-11.el7_0.s390x", "7Workstation-7.0.Z:libyaml-0:0.1.4-11.el7_0.src", "7Workstation-7.0.Z:libyaml-0:0.1.4-11.el7_0.x86_64", "7Workstation-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.i686", "7Workstation-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.ppc", "7Workstation-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.ppc64", "7Workstation-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.s390", "7Workstation-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.s390x", "7Workstation-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.x86_64", "7Workstation-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.i686", "7Workstation-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.ppc", "7Workstation-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.ppc64", "7Workstation-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.s390", "7Workstation-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.s390x", "7Workstation-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.x86_64", "7Workstation-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.i686", "7Workstation-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.ppc", "7Workstation-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.ppc64", "7Workstation-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.s390", "7Workstation-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.s390x", "7Workstation-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.src", "7Workstation-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.x86_64", "7Workstation-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.i686", "7Workstation-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.ppc", "7Workstation-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.ppc64", "7Workstation-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.s390", "7Workstation-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.s390x", "7Workstation-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.x86_64", "7Workstation-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.i686", "7Workstation-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.ppc", "7Workstation-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.ppc64", "7Workstation-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.s390", "7Workstation-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.s390x", "7Workstation-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:0100" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Client-6.6.z:libyaml-0:0.1.3-4.el6_6.i686", "6Client-6.6.z:libyaml-0:0.1.3-4.el6_6.ppc", "6Client-6.6.z:libyaml-0:0.1.3-4.el6_6.ppc64", "6Client-6.6.z:libyaml-0:0.1.3-4.el6_6.s390", "6Client-6.6.z:libyaml-0:0.1.3-4.el6_6.s390x", "6Client-6.6.z:libyaml-0:0.1.3-4.el6_6.src", "6Client-6.6.z:libyaml-0:0.1.3-4.el6_6.x86_64", "6Client-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.i686", "6Client-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.ppc", "6Client-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.ppc64", "6Client-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.s390", "6Client-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.s390x", "6Client-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64", "6Client-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.i686", "6Client-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.ppc", "6Client-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.ppc64", "6Client-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.s390", "6Client-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.s390x", "6Client-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.x86_64", "6Client-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.i686", "6Client-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.ppc", "6Client-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.ppc64", "6Client-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.s390", "6Client-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.s390x", "6Client-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.src", "6Client-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.x86_64", "6Client-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.i686", "6Client-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.ppc", "6Client-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.ppc64", "6Client-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.s390", "6Client-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.s390x", "6Client-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64", "6Client-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.i686", "6Client-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.ppc", "6Client-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.ppc64", "6Client-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.s390", "6Client-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.s390x", "6Client-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.x86_64", "6ComputeNode-6.6.z:libyaml-0:0.1.3-4.el6_6.i686", "6ComputeNode-6.6.z:libyaml-0:0.1.3-4.el6_6.ppc", "6ComputeNode-6.6.z:libyaml-0:0.1.3-4.el6_6.ppc64", "6ComputeNode-6.6.z:libyaml-0:0.1.3-4.el6_6.s390", "6ComputeNode-6.6.z:libyaml-0:0.1.3-4.el6_6.s390x", "6ComputeNode-6.6.z:libyaml-0:0.1.3-4.el6_6.src", "6ComputeNode-6.6.z:libyaml-0:0.1.3-4.el6_6.x86_64", "6ComputeNode-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.i686", "6ComputeNode-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.ppc", "6ComputeNode-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.ppc64", "6ComputeNode-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.s390", "6ComputeNode-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.s390x", "6ComputeNode-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64", "6ComputeNode-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.i686", "6ComputeNode-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.ppc", "6ComputeNode-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.ppc64", "6ComputeNode-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.s390", "6ComputeNode-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.s390x", "6ComputeNode-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.x86_64", "6ComputeNode-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.i686", "6ComputeNode-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.ppc", "6ComputeNode-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.ppc64", "6ComputeNode-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.s390", "6ComputeNode-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.s390x", "6ComputeNode-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.src", "6ComputeNode-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.x86_64", "6ComputeNode-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.i686", "6ComputeNode-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.ppc", "6ComputeNode-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.ppc64", "6ComputeNode-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.s390", "6ComputeNode-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.s390x", "6ComputeNode-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64", "6ComputeNode-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.i686", "6ComputeNode-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.ppc", "6ComputeNode-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.ppc64", "6ComputeNode-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.s390", "6ComputeNode-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.s390x", "6ComputeNode-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.x86_64", "6Server-6.6.z:libyaml-0:0.1.3-4.el6_6.i686", "6Server-6.6.z:libyaml-0:0.1.3-4.el6_6.ppc", "6Server-6.6.z:libyaml-0:0.1.3-4.el6_6.ppc64", "6Server-6.6.z:libyaml-0:0.1.3-4.el6_6.s390", "6Server-6.6.z:libyaml-0:0.1.3-4.el6_6.s390x", "6Server-6.6.z:libyaml-0:0.1.3-4.el6_6.src", "6Server-6.6.z:libyaml-0:0.1.3-4.el6_6.x86_64", "6Server-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.i686", "6Server-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.ppc", "6Server-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.ppc64", "6Server-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.s390", "6Server-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.s390x", "6Server-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64", "6Server-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.i686", "6Server-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.ppc", "6Server-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.ppc64", "6Server-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.s390", "6Server-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.s390x", "6Server-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.x86_64", "6Server-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.i686", "6Server-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.ppc", "6Server-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.ppc64", "6Server-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.s390", "6Server-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.s390x", "6Server-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.src", "6Server-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.x86_64", "6Server-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.i686", "6Server-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.ppc", "6Server-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.ppc64", "6Server-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.s390", "6Server-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.s390x", "6Server-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64", "6Server-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.i686", "6Server-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.ppc", "6Server-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.ppc64", "6Server-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.s390", "6Server-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.s390x", "6Server-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.x86_64", "6Workstation-6.6.z:libyaml-0:0.1.3-4.el6_6.i686", "6Workstation-6.6.z:libyaml-0:0.1.3-4.el6_6.ppc", "6Workstation-6.6.z:libyaml-0:0.1.3-4.el6_6.ppc64", "6Workstation-6.6.z:libyaml-0:0.1.3-4.el6_6.s390", "6Workstation-6.6.z:libyaml-0:0.1.3-4.el6_6.s390x", "6Workstation-6.6.z:libyaml-0:0.1.3-4.el6_6.src", "6Workstation-6.6.z:libyaml-0:0.1.3-4.el6_6.x86_64", "6Workstation-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.i686", "6Workstation-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.ppc", "6Workstation-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.ppc64", "6Workstation-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.s390", "6Workstation-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.s390x", "6Workstation-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64", "6Workstation-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.i686", "6Workstation-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.ppc", "6Workstation-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.ppc64", "6Workstation-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.s390", "6Workstation-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.s390x", "6Workstation-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.x86_64", "6Workstation-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.i686", "6Workstation-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.ppc", "6Workstation-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.ppc64", "6Workstation-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.s390", "6Workstation-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.s390x", "6Workstation-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.src", "6Workstation-optional-6.6.z:libyaml-0:0.1.3-4.el6_6.x86_64", "6Workstation-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.i686", "6Workstation-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.ppc", "6Workstation-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.ppc64", "6Workstation-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.s390", "6Workstation-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.s390x", "6Workstation-optional-6.6.z:libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64", "6Workstation-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.i686", "6Workstation-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.ppc", "6Workstation-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.ppc64", "6Workstation-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.s390", "6Workstation-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.s390x", "6Workstation-optional-6.6.z:libyaml-devel-0:0.1.3-4.el6_6.x86_64", "7Client-7.0.Z:libyaml-0:0.1.4-11.el7_0.i686", "7Client-7.0.Z:libyaml-0:0.1.4-11.el7_0.ppc", "7Client-7.0.Z:libyaml-0:0.1.4-11.el7_0.ppc64", "7Client-7.0.Z:libyaml-0:0.1.4-11.el7_0.s390", "7Client-7.0.Z:libyaml-0:0.1.4-11.el7_0.s390x", "7Client-7.0.Z:libyaml-0:0.1.4-11.el7_0.src", "7Client-7.0.Z:libyaml-0:0.1.4-11.el7_0.x86_64", "7Client-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.i686", "7Client-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.ppc", "7Client-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.ppc64", "7Client-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.s390", "7Client-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.s390x", "7Client-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.x86_64", "7Client-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.i686", "7Client-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.ppc", "7Client-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.ppc64", "7Client-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.s390", "7Client-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.s390x", "7Client-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.x86_64", "7Client-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.i686", "7Client-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.ppc", "7Client-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.ppc64", "7Client-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.s390", "7Client-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.s390x", "7Client-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.src", "7Client-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.x86_64", "7Client-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.i686", "7Client-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.ppc", "7Client-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.ppc64", "7Client-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.s390", "7Client-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.s390x", "7Client-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.x86_64", "7Client-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.i686", "7Client-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.ppc", "7Client-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.ppc64", "7Client-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.s390", "7Client-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.s390x", "7Client-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.x86_64", "7ComputeNode-7.0.Z:libyaml-0:0.1.4-11.el7_0.i686", "7ComputeNode-7.0.Z:libyaml-0:0.1.4-11.el7_0.ppc", "7ComputeNode-7.0.Z:libyaml-0:0.1.4-11.el7_0.ppc64", "7ComputeNode-7.0.Z:libyaml-0:0.1.4-11.el7_0.s390", "7ComputeNode-7.0.Z:libyaml-0:0.1.4-11.el7_0.s390x", "7ComputeNode-7.0.Z:libyaml-0:0.1.4-11.el7_0.src", "7ComputeNode-7.0.Z:libyaml-0:0.1.4-11.el7_0.x86_64", "7ComputeNode-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.i686", "7ComputeNode-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.ppc", "7ComputeNode-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.ppc64", "7ComputeNode-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.s390", "7ComputeNode-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.s390x", "7ComputeNode-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.x86_64", "7ComputeNode-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.i686", "7ComputeNode-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.ppc", "7ComputeNode-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.ppc64", "7ComputeNode-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.s390", "7ComputeNode-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.s390x", "7ComputeNode-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.i686", "7ComputeNode-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.ppc", "7ComputeNode-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.s390", "7ComputeNode-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.s390x", "7ComputeNode-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.src", "7ComputeNode-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.i686", "7ComputeNode-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.ppc", "7ComputeNode-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.s390", "7ComputeNode-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.s390x", "7ComputeNode-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.i686", "7ComputeNode-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.ppc", "7ComputeNode-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.s390", "7ComputeNode-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.s390x", "7ComputeNode-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.x86_64", "7Server-7.0.Z:libyaml-0:0.1.4-11.el7_0.i686", "7Server-7.0.Z:libyaml-0:0.1.4-11.el7_0.ppc", "7Server-7.0.Z:libyaml-0:0.1.4-11.el7_0.ppc64", "7Server-7.0.Z:libyaml-0:0.1.4-11.el7_0.s390", "7Server-7.0.Z:libyaml-0:0.1.4-11.el7_0.s390x", "7Server-7.0.Z:libyaml-0:0.1.4-11.el7_0.src", "7Server-7.0.Z:libyaml-0:0.1.4-11.el7_0.x86_64", "7Server-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.i686", "7Server-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.ppc", "7Server-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.ppc64", "7Server-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.s390", "7Server-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.s390x", "7Server-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.x86_64", "7Server-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.i686", "7Server-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.ppc", "7Server-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.ppc64", "7Server-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.s390", "7Server-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.s390x", "7Server-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.x86_64", "7Server-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.i686", "7Server-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.ppc", "7Server-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.ppc64", "7Server-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.s390", "7Server-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.s390x", "7Server-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.src", "7Server-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.x86_64", "7Server-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.i686", "7Server-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.ppc", "7Server-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.ppc64", "7Server-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.s390", "7Server-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.s390x", "7Server-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.x86_64", "7Server-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.i686", "7Server-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.ppc", "7Server-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.ppc64", "7Server-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.s390", "7Server-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.s390x", "7Server-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.x86_64", "7Workstation-7.0.Z:libyaml-0:0.1.4-11.el7_0.i686", "7Workstation-7.0.Z:libyaml-0:0.1.4-11.el7_0.ppc", "7Workstation-7.0.Z:libyaml-0:0.1.4-11.el7_0.ppc64", "7Workstation-7.0.Z:libyaml-0:0.1.4-11.el7_0.s390", "7Workstation-7.0.Z:libyaml-0:0.1.4-11.el7_0.s390x", "7Workstation-7.0.Z:libyaml-0:0.1.4-11.el7_0.src", "7Workstation-7.0.Z:libyaml-0:0.1.4-11.el7_0.x86_64", "7Workstation-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.i686", "7Workstation-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.ppc", "7Workstation-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.ppc64", "7Workstation-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.s390", "7Workstation-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.s390x", "7Workstation-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.x86_64", "7Workstation-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.i686", "7Workstation-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.ppc", "7Workstation-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.ppc64", "7Workstation-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.s390", "7Workstation-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.s390x", "7Workstation-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.x86_64", "7Workstation-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.i686", "7Workstation-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.ppc", "7Workstation-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.ppc64", "7Workstation-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.s390", "7Workstation-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.s390x", "7Workstation-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.src", "7Workstation-optional-7.0.Z:libyaml-0:0.1.4-11.el7_0.x86_64", "7Workstation-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.i686", "7Workstation-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.ppc", "7Workstation-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.ppc64", "7Workstation-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.s390", "7Workstation-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.s390x", "7Workstation-optional-7.0.Z:libyaml-debuginfo-0:0.1.4-11.el7_0.x86_64", "7Workstation-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.i686", "7Workstation-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.ppc", "7Workstation-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.ppc64", "7Workstation-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.s390", "7Workstation-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.s390x", "7Workstation-optional-7.0.Z:libyaml-devel-0:0.1.4-11.el7_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libyaml: assert failure when processing wrapped strings" } ] }
rhsa-2015:0260
Vulnerability from csaf_redhat
Published
2015-02-23 12:55
Modified
2025-08-01 21:43
Summary
Red Hat Security Advisory: libyaml security update
Notes
Topic
Updated libyaml packages that fix one security issue are now available for
Red Hat Enterprise Linux OpenStack Platform 4.0 and 5.0 for Red Hat
Enterprise Linux 6.
Red Hat Product Security has rated this update as having Moderate security
impact. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available from the CVE link in the
References section.
Details
YAML is a data serialization format designed for human readability and
interaction with scripting languages. LibYAML is a YAML parser and emitter
written in C.
An assertion failure was found in the way the libyaml library parsed
wrapped strings. An attacker able to load specially crafted YAML input into
an application using libyaml could cause the application to crash.
(CVE-2014-9130)
All libyaml users are advised to upgrade to these updated packages, which
contain a backported patch to correct this issue. All running applications
linked against the libyaml library must be restarted for this update to
take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated libyaml packages that fix one security issue are now available for\nRed Hat Enterprise Linux OpenStack Platform 4.0 and 5.0 for Red Hat\nEnterprise Linux 6.\n\nRed Hat Product Security has rated this update as having Moderate security\nimpact. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available from the CVE link in the\nReferences section.", "title": "Topic" }, { "category": "general", "text": "YAML is a data serialization format designed for human readability and\ninteraction with scripting languages. LibYAML is a YAML parser and emitter\nwritten in C.\n\nAn assertion failure was found in the way the libyaml library parsed\nwrapped strings. An attacker able to load specially crafted YAML input into\nan application using libyaml could cause the application to crash.\n(CVE-2014-9130)\n\nAll libyaml users are advised to upgrade to these updated packages, which\ncontain a backported patch to correct this issue. All running applications\nlinked against the libyaml library must be restarted for this update to\ntake effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2015:0260", "url": "https://access.redhat.com/errata/RHSA-2015:0260" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1169369", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1169369" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhsa-2015_0260.json" } ], "title": "Red Hat Security Advisory: libyaml security update", "tracking": { "current_release_date": "2025-08-01T21:43:48+00:00", "generator": { "date": "2025-08-01T21:43:48+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2015:0260", "initial_release_date": "2015-02-23T12:55:31+00:00", "revision_history": [ { "date": "2015-02-23T12:55:31+00:00", "number": "1", "summary": "Initial version" }, { "date": "2015-02-23T12:55:31+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-01T21:43:48+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6", "product": { "name": "Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6", "product_id": "6Server-RH6-RHOS-5.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:5::el6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux OpenStack Platform 4.0", "product": { "name": "Red Hat Enterprise Linux OpenStack Platform 4.0", "product_id": "6Server-RHOS-4.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:4::el6" } } } ], "category": "product_family", "name": "Red Hat OpenStack Platform" }, { "branches": [ { "category": "product_version", "name": "libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64", "product": { "name": "libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64", "product_id": "libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libyaml-debuginfo@0.1.3-4.el6_6?arch=x86_64" } } }, { "category": "product_version", "name": "libyaml-devel-0:0.1.3-4.el6_6.x86_64", "product": { "name": "libyaml-devel-0:0.1.3-4.el6_6.x86_64", "product_id": "libyaml-devel-0:0.1.3-4.el6_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libyaml-devel@0.1.3-4.el6_6?arch=x86_64" } } }, { "category": "product_version", "name": "libyaml-0:0.1.3-4.el6_6.x86_64", "product": { "name": "libyaml-0:0.1.3-4.el6_6.x86_64", "product_id": "libyaml-0:0.1.3-4.el6_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libyaml@0.1.3-4.el6_6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "libyaml-0:0.1.3-4.el6_6.src", "product": { "name": "libyaml-0:0.1.3-4.el6_6.src", "product_id": "libyaml-0:0.1.3-4.el6_6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/libyaml@0.1.3-4.el6_6?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.3-4.el6_6.src as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6", "product_id": "6Server-RH6-RHOS-5.0:libyaml-0:0.1.3-4.el6_6.src" }, "product_reference": "libyaml-0:0.1.3-4.el6_6.src", "relates_to_product_reference": "6Server-RH6-RHOS-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.3-4.el6_6.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6", "product_id": "6Server-RH6-RHOS-5.0:libyaml-0:0.1.3-4.el6_6.x86_64" }, "product_reference": "libyaml-0:0.1.3-4.el6_6.x86_64", "relates_to_product_reference": "6Server-RH6-RHOS-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6", "product_id": "6Server-RH6-RHOS-5.0:libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64" }, "product_reference": "libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64", "relates_to_product_reference": "6Server-RH6-RHOS-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.3-4.el6_6.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6", "product_id": "6Server-RH6-RHOS-5.0:libyaml-devel-0:0.1.3-4.el6_6.x86_64" }, "product_reference": "libyaml-devel-0:0.1.3-4.el6_6.x86_64", "relates_to_product_reference": "6Server-RH6-RHOS-5.0" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.3-4.el6_6.src as a component of Red Hat Enterprise Linux OpenStack Platform 4.0", "product_id": "6Server-RHOS-4.0:libyaml-0:0.1.3-4.el6_6.src" }, "product_reference": "libyaml-0:0.1.3-4.el6_6.src", "relates_to_product_reference": "6Server-RHOS-4.0" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.3-4.el6_6.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 4.0", "product_id": "6Server-RHOS-4.0:libyaml-0:0.1.3-4.el6_6.x86_64" }, "product_reference": "libyaml-0:0.1.3-4.el6_6.x86_64", "relates_to_product_reference": "6Server-RHOS-4.0" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 4.0", "product_id": "6Server-RHOS-4.0:libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64" }, "product_reference": "libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64", "relates_to_product_reference": "6Server-RHOS-4.0" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.3-4.el6_6.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 4.0", "product_id": "6Server-RHOS-4.0:libyaml-devel-0:0.1.3-4.el6_6.x86_64" }, "product_reference": "libyaml-devel-0:0.1.3-4.el6_6.x86_64", "relates_to_product_reference": "6Server-RHOS-4.0" } ] }, "vulnerabilities": [ { "cve": "CVE-2014-9130", "cwe": { "id": "CWE-617", "name": "Reachable Assertion" }, "discovery_date": "2014-12-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1169369" } ], "notes": [ { "category": "description", "text": "An assertion failure was found in the way the libyaml library parsed wrapped strings. An attacker able to load specially crafted YAML input into an application using libyaml could cause the application to crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "libyaml: assert failure when processing wrapped strings", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RH6-RHOS-5.0:libyaml-0:0.1.3-4.el6_6.src", "6Server-RH6-RHOS-5.0:libyaml-0:0.1.3-4.el6_6.x86_64", "6Server-RH6-RHOS-5.0:libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64", "6Server-RH6-RHOS-5.0:libyaml-devel-0:0.1.3-4.el6_6.x86_64", "6Server-RHOS-4.0:libyaml-0:0.1.3-4.el6_6.src", "6Server-RHOS-4.0:libyaml-0:0.1.3-4.el6_6.x86_64", "6Server-RHOS-4.0:libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64", "6Server-RHOS-4.0:libyaml-devel-0:0.1.3-4.el6_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-9130" }, { "category": "external", "summary": "RHBZ#1169369", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1169369" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-9130", "url": "https://www.cve.org/CVERecord?id=CVE-2014-9130" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-9130", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-9130" } ], "release_date": "2014-11-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-02-23T12:55:31+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-RH6-RHOS-5.0:libyaml-0:0.1.3-4.el6_6.src", "6Server-RH6-RHOS-5.0:libyaml-0:0.1.3-4.el6_6.x86_64", "6Server-RH6-RHOS-5.0:libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64", "6Server-RH6-RHOS-5.0:libyaml-devel-0:0.1.3-4.el6_6.x86_64", "6Server-RHOS-4.0:libyaml-0:0.1.3-4.el6_6.src", "6Server-RHOS-4.0:libyaml-0:0.1.3-4.el6_6.x86_64", "6Server-RHOS-4.0:libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64", "6Server-RHOS-4.0:libyaml-devel-0:0.1.3-4.el6_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:0260" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Server-RH6-RHOS-5.0:libyaml-0:0.1.3-4.el6_6.src", "6Server-RH6-RHOS-5.0:libyaml-0:0.1.3-4.el6_6.x86_64", "6Server-RH6-RHOS-5.0:libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64", "6Server-RH6-RHOS-5.0:libyaml-devel-0:0.1.3-4.el6_6.x86_64", "6Server-RHOS-4.0:libyaml-0:0.1.3-4.el6_6.src", "6Server-RHOS-4.0:libyaml-0:0.1.3-4.el6_6.x86_64", "6Server-RHOS-4.0:libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64", "6Server-RHOS-4.0:libyaml-devel-0:0.1.3-4.el6_6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libyaml: assert failure when processing wrapped strings" } ] }
rhsa-2015:0112
Vulnerability from csaf_redhat
Published
2015-02-02 19:15
Modified
2025-08-01 21:43
Summary
Red Hat Security Advisory: libyaml security update
Notes
Topic
Updated libyaml packages that fix one security issue are now available for
Red Hat Software Collections 1.
Red Hat Product Security has rated this update as having Moderate security
impact. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available from the CVE link in the
References section.
Details
YAML is a data serialization format designed for human readability and
interaction with scripting languages. LibYAML is a YAML parser and emitter
written in C.
An assertion failure was found in the way the libyaml library parsed
wrapped strings. An attacker able to load specially crafted YAML input into
an application using libyaml could cause the application to crash.
(CVE-2014-9130)
All libyaml users are advised to upgrade to these updated packages, which
contain a backported patch to correct this issue. All running applications
linked against the libyaml library must be restarted for this update to
take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated libyaml packages that fix one security issue are now available for\nRed Hat Software Collections 1.\n\nRed Hat Product Security has rated this update as having Moderate security\nimpact. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available from the CVE link in the\nReferences section.", "title": "Topic" }, { "category": "general", "text": "YAML is a data serialization format designed for human readability and\ninteraction with scripting languages. LibYAML is a YAML parser and emitter\nwritten in C.\n\nAn assertion failure was found in the way the libyaml library parsed\nwrapped strings. An attacker able to load specially crafted YAML input into\nan application using libyaml could cause the application to crash.\n(CVE-2014-9130)\n\nAll libyaml users are advised to upgrade to these updated packages, which\ncontain a backported patch to correct this issue. All running applications\nlinked against the libyaml library must be restarted for this update to\ntake effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2015:0112", "url": "https://access.redhat.com/errata/RHSA-2015:0112" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1169369", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1169369" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhsa-2015_0112.json" } ], "title": "Red Hat Security Advisory: libyaml security update", "tracking": { "current_release_date": "2025-08-01T21:43:35+00:00", "generator": { "date": "2025-08-01T21:43:35+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2015:0112", "initial_release_date": "2015-02-02T19:15:06+00:00", "revision_history": [ { "date": "2015-02-02T19:15:06+00:00", "number": "1", "summary": "Initial version" }, { "date": "2015-02-02T19:15:06+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-01T21:43:35+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Software Collections 1 for Red Hat Enterprise Linux Server EUS (v. 6.5)", "product": { "name": "Red Hat Software Collections 1 for Red Hat Enterprise Linux Server EUS (v. 6.5)", "product_id": "6Server-RHSCL-1.2-6.5.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:1::el6" } } }, { "category": "product_name", "name": "Red Hat Software Collections 1 for Red Hat Enterprise Linux Server EUS (v. 6.4)", "product": { "name": "Red Hat Software Collections 1 for Red Hat Enterprise Linux Server EUS (v. 6.4)", "product_id": "6Server-RHSCL-1.2-6.4.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:1::el6" } } }, { "category": "product_name", "name": "Red Hat Software Collections 1 for Red Hat Enterprise Linux Server EUS (v. 6.6)", "product": { "name": "Red Hat Software Collections 1 for Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-RHSCL-1.2-6.6.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:1::el6" } } }, { "category": "product_name", "name": "Red Hat Software Collections 1 for Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Software Collections 1 for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-1.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:1::el6" } } }, { "category": "product_name", "name": "Red Hat Software Collections 1 for Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Software Collections 1 for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-1.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:1::el6" } } } ], "category": "product_family", "name": "Red Hat Software Collections" }, { "branches": [ { "category": "product_version", "name": "libyaml-0:0.1.3-4.el6_6.src", "product": { "name": "libyaml-0:0.1.3-4.el6_6.src", "product_id": "libyaml-0:0.1.3-4.el6_6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/libyaml@0.1.3-4.el6_6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "libyaml-0:0.1.3-4.el6_6.i686", "product": { "name": "libyaml-0:0.1.3-4.el6_6.i686", "product_id": "libyaml-0:0.1.3-4.el6_6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libyaml@0.1.3-4.el6_6?arch=i686" } } }, { "category": "product_version", "name": "libyaml-debuginfo-0:0.1.3-4.el6_6.i686", "product": { "name": "libyaml-debuginfo-0:0.1.3-4.el6_6.i686", "product_id": "libyaml-debuginfo-0:0.1.3-4.el6_6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libyaml-debuginfo@0.1.3-4.el6_6?arch=i686" } } }, { "category": "product_version", "name": "libyaml-devel-0:0.1.3-4.el6_6.i686", "product": { "name": "libyaml-devel-0:0.1.3-4.el6_6.i686", "product_id": "libyaml-devel-0:0.1.3-4.el6_6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libyaml-devel@0.1.3-4.el6_6?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "libyaml-0:0.1.3-4.el6_6.x86_64", "product": { "name": "libyaml-0:0.1.3-4.el6_6.x86_64", "product_id": "libyaml-0:0.1.3-4.el6_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libyaml@0.1.3-4.el6_6?arch=x86_64" } } }, { "category": "product_version", "name": "libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64", "product": { "name": "libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64", "product_id": "libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libyaml-debuginfo@0.1.3-4.el6_6?arch=x86_64" } } }, { "category": "product_version", "name": "libyaml-devel-0:0.1.3-4.el6_6.x86_64", "product": { "name": "libyaml-devel-0:0.1.3-4.el6_6.x86_64", "product_id": "libyaml-devel-0:0.1.3-4.el6_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libyaml-devel@0.1.3-4.el6_6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.3-4.el6_6.i686 as a component of Red Hat Software Collections 1 for Red Hat Enterprise Linux Server EUS (v. 6.4)", "product_id": "6Server-RHSCL-1.2-6.4.Z:libyaml-0:0.1.3-4.el6_6.i686" }, "product_reference": "libyaml-0:0.1.3-4.el6_6.i686", "relates_to_product_reference": "6Server-RHSCL-1.2-6.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.3-4.el6_6.src as a component of Red Hat Software Collections 1 for Red Hat Enterprise Linux Server EUS (v. 6.4)", "product_id": "6Server-RHSCL-1.2-6.4.Z:libyaml-0:0.1.3-4.el6_6.src" }, "product_reference": "libyaml-0:0.1.3-4.el6_6.src", "relates_to_product_reference": "6Server-RHSCL-1.2-6.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.3-4.el6_6.x86_64 as a component of Red Hat Software Collections 1 for Red Hat Enterprise Linux Server EUS (v. 6.4)", "product_id": "6Server-RHSCL-1.2-6.4.Z:libyaml-0:0.1.3-4.el6_6.x86_64" }, "product_reference": "libyaml-0:0.1.3-4.el6_6.x86_64", "relates_to_product_reference": "6Server-RHSCL-1.2-6.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.3-4.el6_6.i686 as a component of Red Hat Software Collections 1 for Red Hat Enterprise Linux Server EUS (v. 6.4)", "product_id": "6Server-RHSCL-1.2-6.4.Z:libyaml-debuginfo-0:0.1.3-4.el6_6.i686" }, "product_reference": "libyaml-debuginfo-0:0.1.3-4.el6_6.i686", "relates_to_product_reference": "6Server-RHSCL-1.2-6.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64 as a component of Red Hat Software Collections 1 for Red Hat Enterprise Linux Server EUS (v. 6.4)", "product_id": "6Server-RHSCL-1.2-6.4.Z:libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64" }, "product_reference": "libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64", "relates_to_product_reference": "6Server-RHSCL-1.2-6.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.3-4.el6_6.i686 as a component of Red Hat Software Collections 1 for Red Hat Enterprise Linux Server EUS (v. 6.4)", "product_id": "6Server-RHSCL-1.2-6.4.Z:libyaml-devel-0:0.1.3-4.el6_6.i686" }, "product_reference": "libyaml-devel-0:0.1.3-4.el6_6.i686", "relates_to_product_reference": "6Server-RHSCL-1.2-6.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.3-4.el6_6.x86_64 as a component of Red Hat Software Collections 1 for Red Hat Enterprise Linux Server EUS (v. 6.4)", "product_id": "6Server-RHSCL-1.2-6.4.Z:libyaml-devel-0:0.1.3-4.el6_6.x86_64" }, "product_reference": "libyaml-devel-0:0.1.3-4.el6_6.x86_64", "relates_to_product_reference": "6Server-RHSCL-1.2-6.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.3-4.el6_6.i686 as a component of Red Hat Software Collections 1 for Red Hat Enterprise Linux Server EUS (v. 6.5)", "product_id": "6Server-RHSCL-1.2-6.5.Z:libyaml-0:0.1.3-4.el6_6.i686" }, "product_reference": "libyaml-0:0.1.3-4.el6_6.i686", "relates_to_product_reference": "6Server-RHSCL-1.2-6.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.3-4.el6_6.src as a component of Red Hat Software Collections 1 for Red Hat Enterprise Linux Server EUS (v. 6.5)", "product_id": "6Server-RHSCL-1.2-6.5.Z:libyaml-0:0.1.3-4.el6_6.src" }, "product_reference": "libyaml-0:0.1.3-4.el6_6.src", "relates_to_product_reference": "6Server-RHSCL-1.2-6.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.3-4.el6_6.x86_64 as a component of Red Hat Software Collections 1 for Red Hat Enterprise Linux Server EUS (v. 6.5)", "product_id": "6Server-RHSCL-1.2-6.5.Z:libyaml-0:0.1.3-4.el6_6.x86_64" }, "product_reference": "libyaml-0:0.1.3-4.el6_6.x86_64", "relates_to_product_reference": "6Server-RHSCL-1.2-6.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.3-4.el6_6.i686 as a component of Red Hat Software Collections 1 for Red Hat Enterprise Linux Server EUS (v. 6.5)", "product_id": "6Server-RHSCL-1.2-6.5.Z:libyaml-debuginfo-0:0.1.3-4.el6_6.i686" }, "product_reference": "libyaml-debuginfo-0:0.1.3-4.el6_6.i686", "relates_to_product_reference": "6Server-RHSCL-1.2-6.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64 as a component of Red Hat Software Collections 1 for Red Hat Enterprise Linux Server EUS (v. 6.5)", "product_id": "6Server-RHSCL-1.2-6.5.Z:libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64" }, "product_reference": "libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64", "relates_to_product_reference": "6Server-RHSCL-1.2-6.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.3-4.el6_6.i686 as a component of Red Hat Software Collections 1 for Red Hat Enterprise Linux Server EUS (v. 6.5)", "product_id": "6Server-RHSCL-1.2-6.5.Z:libyaml-devel-0:0.1.3-4.el6_6.i686" }, "product_reference": "libyaml-devel-0:0.1.3-4.el6_6.i686", "relates_to_product_reference": "6Server-RHSCL-1.2-6.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.3-4.el6_6.x86_64 as a component of Red Hat Software Collections 1 for Red Hat Enterprise Linux Server EUS (v. 6.5)", "product_id": "6Server-RHSCL-1.2-6.5.Z:libyaml-devel-0:0.1.3-4.el6_6.x86_64" }, "product_reference": "libyaml-devel-0:0.1.3-4.el6_6.x86_64", "relates_to_product_reference": "6Server-RHSCL-1.2-6.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.3-4.el6_6.i686 as a component of Red Hat Software Collections 1 for Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-RHSCL-1.2-6.6.Z:libyaml-0:0.1.3-4.el6_6.i686" }, "product_reference": "libyaml-0:0.1.3-4.el6_6.i686", "relates_to_product_reference": "6Server-RHSCL-1.2-6.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.3-4.el6_6.src as a component of Red Hat Software Collections 1 for Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-RHSCL-1.2-6.6.Z:libyaml-0:0.1.3-4.el6_6.src" }, "product_reference": "libyaml-0:0.1.3-4.el6_6.src", "relates_to_product_reference": "6Server-RHSCL-1.2-6.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.3-4.el6_6.x86_64 as a component of Red Hat Software Collections 1 for Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-RHSCL-1.2-6.6.Z:libyaml-0:0.1.3-4.el6_6.x86_64" }, "product_reference": "libyaml-0:0.1.3-4.el6_6.x86_64", "relates_to_product_reference": "6Server-RHSCL-1.2-6.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.3-4.el6_6.i686 as a component of Red Hat Software Collections 1 for Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-RHSCL-1.2-6.6.Z:libyaml-debuginfo-0:0.1.3-4.el6_6.i686" }, "product_reference": "libyaml-debuginfo-0:0.1.3-4.el6_6.i686", "relates_to_product_reference": "6Server-RHSCL-1.2-6.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64 as a component of Red Hat Software Collections 1 for Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-RHSCL-1.2-6.6.Z:libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64" }, "product_reference": "libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64", "relates_to_product_reference": "6Server-RHSCL-1.2-6.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.3-4.el6_6.i686 as a component of Red Hat Software Collections 1 for Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-RHSCL-1.2-6.6.Z:libyaml-devel-0:0.1.3-4.el6_6.i686" }, "product_reference": "libyaml-devel-0:0.1.3-4.el6_6.i686", "relates_to_product_reference": "6Server-RHSCL-1.2-6.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.3-4.el6_6.x86_64 as a component of Red Hat Software Collections 1 for Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-RHSCL-1.2-6.6.Z:libyaml-devel-0:0.1.3-4.el6_6.x86_64" }, "product_reference": "libyaml-devel-0:0.1.3-4.el6_6.x86_64", "relates_to_product_reference": "6Server-RHSCL-1.2-6.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.3-4.el6_6.i686 as a component of Red Hat Software Collections 1 for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-1.2:libyaml-0:0.1.3-4.el6_6.i686" }, "product_reference": "libyaml-0:0.1.3-4.el6_6.i686", "relates_to_product_reference": "6Server-RHSCL-1.2" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.3-4.el6_6.src as a component of Red Hat Software Collections 1 for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-1.2:libyaml-0:0.1.3-4.el6_6.src" }, "product_reference": "libyaml-0:0.1.3-4.el6_6.src", "relates_to_product_reference": "6Server-RHSCL-1.2" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.3-4.el6_6.x86_64 as a component of Red Hat Software Collections 1 for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-1.2:libyaml-0:0.1.3-4.el6_6.x86_64" }, "product_reference": "libyaml-0:0.1.3-4.el6_6.x86_64", "relates_to_product_reference": "6Server-RHSCL-1.2" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.3-4.el6_6.i686 as a component of Red Hat Software Collections 1 for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-1.2:libyaml-debuginfo-0:0.1.3-4.el6_6.i686" }, "product_reference": "libyaml-debuginfo-0:0.1.3-4.el6_6.i686", "relates_to_product_reference": "6Server-RHSCL-1.2" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64 as a component of Red Hat Software Collections 1 for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-1.2:libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64" }, "product_reference": "libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64", "relates_to_product_reference": "6Server-RHSCL-1.2" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.3-4.el6_6.i686 as a component of Red Hat Software Collections 1 for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-1.2:libyaml-devel-0:0.1.3-4.el6_6.i686" }, "product_reference": "libyaml-devel-0:0.1.3-4.el6_6.i686", "relates_to_product_reference": "6Server-RHSCL-1.2" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.3-4.el6_6.x86_64 as a component of Red Hat Software Collections 1 for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-1.2:libyaml-devel-0:0.1.3-4.el6_6.x86_64" }, "product_reference": "libyaml-devel-0:0.1.3-4.el6_6.x86_64", "relates_to_product_reference": "6Server-RHSCL-1.2" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.3-4.el6_6.i686 as a component of Red Hat Software Collections 1 for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-1.2:libyaml-0:0.1.3-4.el6_6.i686" }, "product_reference": "libyaml-0:0.1.3-4.el6_6.i686", "relates_to_product_reference": "6Workstation-RHSCL-1.2" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.3-4.el6_6.src as a component of Red Hat Software Collections 1 for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-1.2:libyaml-0:0.1.3-4.el6_6.src" }, "product_reference": "libyaml-0:0.1.3-4.el6_6.src", "relates_to_product_reference": "6Workstation-RHSCL-1.2" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-0:0.1.3-4.el6_6.x86_64 as a component of Red Hat Software Collections 1 for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-1.2:libyaml-0:0.1.3-4.el6_6.x86_64" }, "product_reference": "libyaml-0:0.1.3-4.el6_6.x86_64", "relates_to_product_reference": "6Workstation-RHSCL-1.2" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.3-4.el6_6.i686 as a component of Red Hat Software Collections 1 for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-1.2:libyaml-debuginfo-0:0.1.3-4.el6_6.i686" }, "product_reference": "libyaml-debuginfo-0:0.1.3-4.el6_6.i686", "relates_to_product_reference": "6Workstation-RHSCL-1.2" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64 as a component of Red Hat Software Collections 1 for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-1.2:libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64" }, "product_reference": "libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64", "relates_to_product_reference": "6Workstation-RHSCL-1.2" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.3-4.el6_6.i686 as a component of Red Hat Software Collections 1 for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-1.2:libyaml-devel-0:0.1.3-4.el6_6.i686" }, "product_reference": "libyaml-devel-0:0.1.3-4.el6_6.i686", "relates_to_product_reference": "6Workstation-RHSCL-1.2" }, { "category": "default_component_of", "full_product_name": { "name": "libyaml-devel-0:0.1.3-4.el6_6.x86_64 as a component of Red Hat Software Collections 1 for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-1.2:libyaml-devel-0:0.1.3-4.el6_6.x86_64" }, "product_reference": "libyaml-devel-0:0.1.3-4.el6_6.x86_64", "relates_to_product_reference": "6Workstation-RHSCL-1.2" } ] }, "vulnerabilities": [ { "cve": "CVE-2014-9130", "cwe": { "id": "CWE-617", "name": "Reachable Assertion" }, "discovery_date": "2014-12-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1169369" } ], "notes": [ { "category": "description", "text": "An assertion failure was found in the way the libyaml library parsed wrapped strings. An attacker able to load specially crafted YAML input into an application using libyaml could cause the application to crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "libyaml: assert failure when processing wrapped strings", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHSCL-1.2-6.4.Z:libyaml-0:0.1.3-4.el6_6.i686", "6Server-RHSCL-1.2-6.4.Z:libyaml-0:0.1.3-4.el6_6.src", "6Server-RHSCL-1.2-6.4.Z:libyaml-0:0.1.3-4.el6_6.x86_64", "6Server-RHSCL-1.2-6.4.Z:libyaml-debuginfo-0:0.1.3-4.el6_6.i686", "6Server-RHSCL-1.2-6.4.Z:libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64", "6Server-RHSCL-1.2-6.4.Z:libyaml-devel-0:0.1.3-4.el6_6.i686", "6Server-RHSCL-1.2-6.4.Z:libyaml-devel-0:0.1.3-4.el6_6.x86_64", "6Server-RHSCL-1.2-6.5.Z:libyaml-0:0.1.3-4.el6_6.i686", "6Server-RHSCL-1.2-6.5.Z:libyaml-0:0.1.3-4.el6_6.src", "6Server-RHSCL-1.2-6.5.Z:libyaml-0:0.1.3-4.el6_6.x86_64", "6Server-RHSCL-1.2-6.5.Z:libyaml-debuginfo-0:0.1.3-4.el6_6.i686", "6Server-RHSCL-1.2-6.5.Z:libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64", "6Server-RHSCL-1.2-6.5.Z:libyaml-devel-0:0.1.3-4.el6_6.i686", "6Server-RHSCL-1.2-6.5.Z:libyaml-devel-0:0.1.3-4.el6_6.x86_64", "6Server-RHSCL-1.2-6.6.Z:libyaml-0:0.1.3-4.el6_6.i686", "6Server-RHSCL-1.2-6.6.Z:libyaml-0:0.1.3-4.el6_6.src", "6Server-RHSCL-1.2-6.6.Z:libyaml-0:0.1.3-4.el6_6.x86_64", "6Server-RHSCL-1.2-6.6.Z:libyaml-debuginfo-0:0.1.3-4.el6_6.i686", "6Server-RHSCL-1.2-6.6.Z:libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64", "6Server-RHSCL-1.2-6.6.Z:libyaml-devel-0:0.1.3-4.el6_6.i686", "6Server-RHSCL-1.2-6.6.Z:libyaml-devel-0:0.1.3-4.el6_6.x86_64", "6Server-RHSCL-1.2:libyaml-0:0.1.3-4.el6_6.i686", "6Server-RHSCL-1.2:libyaml-0:0.1.3-4.el6_6.src", "6Server-RHSCL-1.2:libyaml-0:0.1.3-4.el6_6.x86_64", "6Server-RHSCL-1.2:libyaml-debuginfo-0:0.1.3-4.el6_6.i686", "6Server-RHSCL-1.2:libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64", "6Server-RHSCL-1.2:libyaml-devel-0:0.1.3-4.el6_6.i686", "6Server-RHSCL-1.2:libyaml-devel-0:0.1.3-4.el6_6.x86_64", "6Workstation-RHSCL-1.2:libyaml-0:0.1.3-4.el6_6.i686", "6Workstation-RHSCL-1.2:libyaml-0:0.1.3-4.el6_6.src", "6Workstation-RHSCL-1.2:libyaml-0:0.1.3-4.el6_6.x86_64", "6Workstation-RHSCL-1.2:libyaml-debuginfo-0:0.1.3-4.el6_6.i686", "6Workstation-RHSCL-1.2:libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64", "6Workstation-RHSCL-1.2:libyaml-devel-0:0.1.3-4.el6_6.i686", "6Workstation-RHSCL-1.2:libyaml-devel-0:0.1.3-4.el6_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-9130" }, { "category": "external", "summary": "RHBZ#1169369", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1169369" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-9130", "url": "https://www.cve.org/CVERecord?id=CVE-2014-9130" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-9130", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-9130" } ], "release_date": "2014-11-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-02-02T19:15:06+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-RHSCL-1.2-6.4.Z:libyaml-0:0.1.3-4.el6_6.i686", "6Server-RHSCL-1.2-6.4.Z:libyaml-0:0.1.3-4.el6_6.src", "6Server-RHSCL-1.2-6.4.Z:libyaml-0:0.1.3-4.el6_6.x86_64", "6Server-RHSCL-1.2-6.4.Z:libyaml-debuginfo-0:0.1.3-4.el6_6.i686", "6Server-RHSCL-1.2-6.4.Z:libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64", "6Server-RHSCL-1.2-6.4.Z:libyaml-devel-0:0.1.3-4.el6_6.i686", "6Server-RHSCL-1.2-6.4.Z:libyaml-devel-0:0.1.3-4.el6_6.x86_64", "6Server-RHSCL-1.2-6.5.Z:libyaml-0:0.1.3-4.el6_6.i686", "6Server-RHSCL-1.2-6.5.Z:libyaml-0:0.1.3-4.el6_6.src", "6Server-RHSCL-1.2-6.5.Z:libyaml-0:0.1.3-4.el6_6.x86_64", "6Server-RHSCL-1.2-6.5.Z:libyaml-debuginfo-0:0.1.3-4.el6_6.i686", "6Server-RHSCL-1.2-6.5.Z:libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64", "6Server-RHSCL-1.2-6.5.Z:libyaml-devel-0:0.1.3-4.el6_6.i686", "6Server-RHSCL-1.2-6.5.Z:libyaml-devel-0:0.1.3-4.el6_6.x86_64", "6Server-RHSCL-1.2-6.6.Z:libyaml-0:0.1.3-4.el6_6.i686", "6Server-RHSCL-1.2-6.6.Z:libyaml-0:0.1.3-4.el6_6.src", "6Server-RHSCL-1.2-6.6.Z:libyaml-0:0.1.3-4.el6_6.x86_64", "6Server-RHSCL-1.2-6.6.Z:libyaml-debuginfo-0:0.1.3-4.el6_6.i686", "6Server-RHSCL-1.2-6.6.Z:libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64", "6Server-RHSCL-1.2-6.6.Z:libyaml-devel-0:0.1.3-4.el6_6.i686", "6Server-RHSCL-1.2-6.6.Z:libyaml-devel-0:0.1.3-4.el6_6.x86_64", "6Server-RHSCL-1.2:libyaml-0:0.1.3-4.el6_6.i686", "6Server-RHSCL-1.2:libyaml-0:0.1.3-4.el6_6.src", "6Server-RHSCL-1.2:libyaml-0:0.1.3-4.el6_6.x86_64", "6Server-RHSCL-1.2:libyaml-debuginfo-0:0.1.3-4.el6_6.i686", "6Server-RHSCL-1.2:libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64", "6Server-RHSCL-1.2:libyaml-devel-0:0.1.3-4.el6_6.i686", "6Server-RHSCL-1.2:libyaml-devel-0:0.1.3-4.el6_6.x86_64", "6Workstation-RHSCL-1.2:libyaml-0:0.1.3-4.el6_6.i686", "6Workstation-RHSCL-1.2:libyaml-0:0.1.3-4.el6_6.src", "6Workstation-RHSCL-1.2:libyaml-0:0.1.3-4.el6_6.x86_64", "6Workstation-RHSCL-1.2:libyaml-debuginfo-0:0.1.3-4.el6_6.i686", "6Workstation-RHSCL-1.2:libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64", "6Workstation-RHSCL-1.2:libyaml-devel-0:0.1.3-4.el6_6.i686", "6Workstation-RHSCL-1.2:libyaml-devel-0:0.1.3-4.el6_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:0112" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Server-RHSCL-1.2-6.4.Z:libyaml-0:0.1.3-4.el6_6.i686", "6Server-RHSCL-1.2-6.4.Z:libyaml-0:0.1.3-4.el6_6.src", "6Server-RHSCL-1.2-6.4.Z:libyaml-0:0.1.3-4.el6_6.x86_64", "6Server-RHSCL-1.2-6.4.Z:libyaml-debuginfo-0:0.1.3-4.el6_6.i686", "6Server-RHSCL-1.2-6.4.Z:libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64", "6Server-RHSCL-1.2-6.4.Z:libyaml-devel-0:0.1.3-4.el6_6.i686", "6Server-RHSCL-1.2-6.4.Z:libyaml-devel-0:0.1.3-4.el6_6.x86_64", "6Server-RHSCL-1.2-6.5.Z:libyaml-0:0.1.3-4.el6_6.i686", "6Server-RHSCL-1.2-6.5.Z:libyaml-0:0.1.3-4.el6_6.src", "6Server-RHSCL-1.2-6.5.Z:libyaml-0:0.1.3-4.el6_6.x86_64", "6Server-RHSCL-1.2-6.5.Z:libyaml-debuginfo-0:0.1.3-4.el6_6.i686", "6Server-RHSCL-1.2-6.5.Z:libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64", "6Server-RHSCL-1.2-6.5.Z:libyaml-devel-0:0.1.3-4.el6_6.i686", "6Server-RHSCL-1.2-6.5.Z:libyaml-devel-0:0.1.3-4.el6_6.x86_64", "6Server-RHSCL-1.2-6.6.Z:libyaml-0:0.1.3-4.el6_6.i686", "6Server-RHSCL-1.2-6.6.Z:libyaml-0:0.1.3-4.el6_6.src", "6Server-RHSCL-1.2-6.6.Z:libyaml-0:0.1.3-4.el6_6.x86_64", "6Server-RHSCL-1.2-6.6.Z:libyaml-debuginfo-0:0.1.3-4.el6_6.i686", "6Server-RHSCL-1.2-6.6.Z:libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64", "6Server-RHSCL-1.2-6.6.Z:libyaml-devel-0:0.1.3-4.el6_6.i686", "6Server-RHSCL-1.2-6.6.Z:libyaml-devel-0:0.1.3-4.el6_6.x86_64", "6Server-RHSCL-1.2:libyaml-0:0.1.3-4.el6_6.i686", "6Server-RHSCL-1.2:libyaml-0:0.1.3-4.el6_6.src", "6Server-RHSCL-1.2:libyaml-0:0.1.3-4.el6_6.x86_64", "6Server-RHSCL-1.2:libyaml-debuginfo-0:0.1.3-4.el6_6.i686", "6Server-RHSCL-1.2:libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64", "6Server-RHSCL-1.2:libyaml-devel-0:0.1.3-4.el6_6.i686", "6Server-RHSCL-1.2:libyaml-devel-0:0.1.3-4.el6_6.x86_64", "6Workstation-RHSCL-1.2:libyaml-0:0.1.3-4.el6_6.i686", "6Workstation-RHSCL-1.2:libyaml-0:0.1.3-4.el6_6.src", "6Workstation-RHSCL-1.2:libyaml-0:0.1.3-4.el6_6.x86_64", "6Workstation-RHSCL-1.2:libyaml-debuginfo-0:0.1.3-4.el6_6.i686", "6Workstation-RHSCL-1.2:libyaml-debuginfo-0:0.1.3-4.el6_6.x86_64", "6Workstation-RHSCL-1.2:libyaml-devel-0:0.1.3-4.el6_6.i686", "6Workstation-RHSCL-1.2:libyaml-devel-0:0.1.3-4.el6_6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libyaml: assert failure when processing wrapped strings" } ] }
ghsa-wrq2-fvvw-grpm
Vulnerability from github
Published
2022-05-17 00:16
Modified
2022-05-17 00:16
VLAI Severity ?
Details
scanner.c in LibYAML 0.1.5 and 0.1.6, as used in the YAML-LibYAML (aka YAML-XS) module for Perl, allows context-dependent attackers to cause a denial of service (assertion failure and crash) via vectors involving line-wrapping.
{ "affected": [], "aliases": [ "CVE-2014-9130" ], "database_specific": { "cwe_ids": [ "CWE-20" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2014-12-08T16:59:00Z", "severity": "MODERATE" }, "details": "scanner.c in LibYAML 0.1.5 and 0.1.6, as used in the YAML-LibYAML (aka YAML-XS) module for Perl, allows context-dependent attackers to cause a denial of service (assertion failure and crash) via vectors involving line-wrapping.", "id": "GHSA-wrq2-fvvw-grpm", "modified": "2022-05-17T00:16:50Z", "published": "2022-05-17T00:16:50Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-9130" }, { "type": "WEB", "url": "https://bitbucket.org/xi/libyaml/commits/2b9156756423e967cfd09a61d125d883fca6f4f2" }, { "type": "WEB", "url": "https://bitbucket.org/xi/libyaml/issue/10/wrapped-strings-cause-assert-failure" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99047" }, { "type": "WEB", "url": "https://puppet.com/security/cve/cve-2014-9130" }, { "type": "WEB", "url": "http://advisories.mageia.org/MGASA-2014-0508.html" }, { "type": "WEB", "url": "http://linux.oracle.com/errata/ELSA-2015-0100.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00078.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-updates/2016-04/msg00050.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2015-0100.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2015-0112.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2015-0260.html" }, { "type": "WEB", "url": "http://secunia.com/advisories/59947" }, { "type": "WEB", "url": "http://secunia.com/advisories/60944" }, { "type": "WEB", "url": "http://secunia.com/advisories/62164" }, { "type": "WEB", "url": "http://secunia.com/advisories/62174" }, { "type": "WEB", "url": "http://secunia.com/advisories/62176" }, { "type": "WEB", "url": "http://secunia.com/advisories/62705" }, { "type": "WEB", "url": "http://secunia.com/advisories/62723" }, { "type": "WEB", "url": "http://secunia.com/advisories/62774" }, { "type": "WEB", "url": "http://www.debian.org/security/2014/dsa-3102" }, { "type": "WEB", "url": "http://www.debian.org/security/2014/dsa-3103" }, { "type": "WEB", "url": "http://www.debian.org/security/2014/dsa-3115" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:242" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:060" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2014/11/28/1" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2014/11/28/8" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2014/11/29/3" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/71349" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-2461-1" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-2461-2" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-2461-3" } ], "schema_version": "1.4.0", "severity": [] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…