Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2018-16845 (GCVE-0-2018-16845)
Vulnerability from cvelistv5
Published
2018-11-07 14:00
Modified
2024-08-05 10:32
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
nginx before versions 1.15.6, 1.14.1 has a vulnerability in the ngx_http_mp4_module, which might allow an attacker to cause infinite loop in a worker process, cause a worker process crash, or might result in worker process memory disclosure by using a specially crafted mp4 file. The issue only affects nginx if it is built with the ngx_http_mp4_module (the module is not built by default) and the .mp4. directive is used in the configuration file. Further, the attack is only possible if an attacker is able to trigger processing of a specially crafted mp4 file with the ngx_http_mp4_module.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T10:32:54.012Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "DSA-4335", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4335" }, { "name": "RHSA-2018:3680", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:3680" }, { "name": "RHSA-2018:3681", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:3681" }, { "name": "105868", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/105868" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16845" }, { "name": "1042039", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1042039" }, { "name": "[debian-lts-announce] 20181108 [SECURITY] [DLA 1572-1] nginx security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00010.html" }, { "name": "RHSA-2018:3653", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:3653" }, { "name": "RHSA-2018:3652", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:3652" }, { "name": "USN-3812-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3812-1/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://mailman.nginx.org/pipermail/nginx-announce/2018/000221.html" }, { "name": "openSUSE-SU-2019:2120", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00035.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/kb/HT212818" }, { "name": "20210921 APPLE-SA-2021-09-20-4 Xcode 13", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2021/Sep/36" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "nginx", "vendor": "[UNKNOWN]", "versions": [ { "status": "affected", "version": "1.15.6" }, { "status": "affected", "version": "1.14.1" } ] } ], "datePublic": "2018-11-06T00:00:00", "descriptions": [ { "lang": "en", "value": "nginx before versions 1.15.6, 1.14.1 has a vulnerability in the ngx_http_mp4_module, which might allow an attacker to cause infinite loop in a worker process, cause a worker process crash, or might result in worker process memory disclosure by using a specially crafted mp4 file. The issue only affects nginx if it is built with the ngx_http_mp4_module (the module is not built by default) and the .mp4. directive is used in the configuration file. Further, the attack is only possible if an attacker is able to trigger processing of a specially crafted mp4 file with the ngx_http_mp4_module." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-09-21T23:07:09", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "DSA-4335", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4335" }, { "name": "RHSA-2018:3680", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:3680" }, { "name": "RHSA-2018:3681", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:3681" }, { "name": "105868", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/105868" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16845" }, { "name": "1042039", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1042039" }, { "name": "[debian-lts-announce] 20181108 [SECURITY] [DLA 1572-1] nginx security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00010.html" }, { "name": "RHSA-2018:3653", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:3653" }, { "name": "RHSA-2018:3652", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:3652" }, { "name": "USN-3812-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3812-1/" }, { "tags": [ "x_refsource_MISC" ], "url": "http://mailman.nginx.org/pipermail/nginx-announce/2018/000221.html" }, { "name": "openSUSE-SU-2019:2120", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00035.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/kb/HT212818" }, { "name": "20210921 APPLE-SA-2021-09-20-4 Xcode 13", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2021/Sep/36" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2018-16845", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "nginx", "version": { "version_data": [ { "version_value": "1.15.6" }, { "version_value": "1.14.1" } ] } } ] }, "vendor_name": "[UNKNOWN]" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "nginx before versions 1.15.6, 1.14.1 has a vulnerability in the ngx_http_mp4_module, which might allow an attacker to cause infinite loop in a worker process, cause a worker process crash, or might result in worker process memory disclosure by using a specially crafted mp4 file. The issue only affects nginx if it is built with the ngx_http_mp4_module (the module is not built by default) and the .mp4. directive is used in the configuration file. Further, the attack is only possible if an attacker is able to trigger processing of a specially crafted mp4 file with the ngx_http_mp4_module." } ] }, "impact": { "cvss": [ [ { "vectorString": "8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.0" } ] ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-400" } ] } ] }, "references": { "reference_data": [ { "name": "DSA-4335", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4335" }, { "name": "RHSA-2018:3680", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:3680" }, { "name": "RHSA-2018:3681", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:3681" }, { "name": "105868", "refsource": "BID", "url": "http://www.securityfocus.com/bid/105868" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16845", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16845" }, { "name": "1042039", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1042039" }, { "name": "[debian-lts-announce] 20181108 [SECURITY] [DLA 1572-1] nginx security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00010.html" }, { "name": "RHSA-2018:3653", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:3653" }, { "name": "RHSA-2018:3652", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:3652" }, { "name": "USN-3812-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3812-1/" }, { "name": "http://mailman.nginx.org/pipermail/nginx-announce/2018/000221.html", "refsource": "MISC", "url": "http://mailman.nginx.org/pipermail/nginx-announce/2018/000221.html" }, { "name": "openSUSE-SU-2019:2120", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00035.html" }, { "name": "https://support.apple.com/kb/HT212818", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT212818" }, { "name": "20210921 APPLE-SA-2021-09-20-4 Xcode 13", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/Sep/36" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2018-16845", "datePublished": "2018-11-07T14:00:00", "dateReserved": "2018-09-11T00:00:00", "dateUpdated": "2024-08-05T10:32:54.012Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2018-16845\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2018-11-07T14:29:00.883\",\"lastModified\":\"2024-11-21T03:53:25.953\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"nginx before versions 1.15.6, 1.14.1 has a vulnerability in the ngx_http_mp4_module, which might allow an attacker to cause infinite loop in a worker process, cause a worker process crash, or might result in worker process memory disclosure by using a specially crafted mp4 file. The issue only affects nginx if it is built with the ngx_http_mp4_module (the module is not built by default) and the .mp4. directive is used in the configuration file. Further, the attack is only possible if an attacker is able to trigger processing of a specially crafted mp4 file with the ngx_http_mp4_module.\"},{\"lang\":\"es\",\"value\":\"nginx en versiones anteriores a la 1.15.6 y 1.14.1 tiene una vulnerabilidad en ngx_http_mp4_module, que podr\u00eda permitir que un atacante provoque un bucle infinito en un proceso worker o resulte en la divulgaci\u00f3n de la memoria del proceso mediante el uso de un archivo mp4 especialmente manipulado. El problema solo afecta a nginx si est\u00e1 incluido con ngx_http_mp4_module (el m\u00f3dulo no est\u00e1 incluido por defecto) y se emplea la directiva .mp4 en el archivo de configuraci\u00f3n. Adem\u00e1s, el atacante solo es posible si un atacante puede desencadenar el procesado de un archivo mp4 especialmente manipulado con ngx_http_mp4_module.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H\",\"baseScore\":6.1,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":4.2}],\"cvssMetricV30\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H\",\"baseScore\":8.2,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":4.2}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:N/A:P\",\"baseScore\":5.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":4.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-400\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-835\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0.7\",\"versionEndIncluding\":\"1.0.15\",\"matchCriteriaId\":\"774FF59B-7E9B-4DFE-BDDA-3261321F62A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.1.3\",\"versionEndIncluding\":\"1.15.5\",\"matchCriteriaId\":\"72F0096B-D1BF-4F0E-960B-42666438B6FD\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*\",\"matchCriteriaId\":\"815D70A8-47D3-459C-A32C-9FEACA0659D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07C312A0-CD2C-4B9C-B064-6409B25C278F\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B620311B-34A3-48A6-82DF-6F078D7A4493\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:xcode:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"13.0\",\"matchCriteriaId\":\"BB279F6B-EE4C-4885-9CD4-657F6BD2548F\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00035.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://mailman.nginx.org/pipermail/nginx-announce/2018/000221.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2021/Sep/36\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/105868\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1042039\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:3652\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:3653\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:3680\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:3681\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16845\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2018/11/msg00010.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/kb/HT212818\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3812-1/\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2018/dsa-4335\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00035.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://mailman.nginx.org/pipermail/nginx-announce/2018/000221.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2021/Sep/36\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/105868\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1042039\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:3652\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:3653\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:3680\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:3681\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16845\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2018/11/msg00010.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/kb/HT212818\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3812-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2018/dsa-4335\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
opensuse-su-2019:0195-1
Vulnerability from csaf_opensuse
Published
2019-03-23 10:59
Modified
2019-03-23 10:59
Summary
Security update for nginx
Notes
Title of the patch
Security update for nginx
Description of the patch
This update for nginx fixes the following issues:
nginx was updated to 1.14.2:
- Bugfix: nginx could not be built on Fedora 28 Linux.
- Bugfix: in handling of client addresses when using unix domain
listen sockets to work with datagrams on Linux.
- Change: the logging level of the 'http request', 'https proxy
request', 'unsupported protocol', 'version too low',
'no suitable key share', and 'no suitable signature algorithm'
SSL errors has been lowered from 'crit' to 'info'.
- Bugfix: when using OpenSSL 1.1.0 or newer it was not possible
to switch off 'ssl_prefer_server_ciphers' in a virtual server
if it was switched on in the default server.
- Bugfix: nginx could not be built with LibreSSL 2.8.0.
- Bugfix: if nginx was built with OpenSSL 1.1.0 and used with
OpenSSL 1.1.1, the TLS 1.3 protocol was always enabled.
- Bugfix: sending a disk-buffered request body to a gRPC backend
might fail.
- Bugfix: connections with some gRPC backends might not be cached when
using the 'keepalive' directive.
- Bugfix: a segmentation fault might occur in a worker process if the
ngx_http_mp4_module was used on 32-bit platforms.
Changes with nginx 1.14.1:
- Security: when using HTTP/2 a client might cause excessive memory
consumption (CVE-2018-16843) and CPU usage (CVE-2018-16844).
- Security: processing of a specially crafted mp4 file with the
ngx_http_mp4_module might result in worker process memory disclosure
(CVE-2018-16845).
- Bugfix: working with gRPC backends might result in excessive memory
consumption.
Changes with nginx 1.13.12:
- Bugfix: connections with gRPC backends might be closed unexpectedly
when returning a large response.
Changes with nginx 1.13.10
- Feature: the 'set' parameter of the 'include' SSI
directive now allows writing arbitrary responses to a
variable; the 'subrequest_output_buffer_size' directive
defines maximum response size.
- Feature: now nginx uses clock_gettime(CLOCK_MONOTONIC) if available,
to avoid timeouts being incorrectly triggered on system time changes.
- Feature: the 'escape=none' parameter of the 'log_format' directive.
Thanks to Johannes Baiter and Calin Don.
- Feature: the $ssl_preread_alpn_protocols variable in the
ngx_stream_ssl_preread_module.
- Feature: the ngx_http_grpc_module.
- Bugfix: in memory allocation error handling in the 'geo' directive.
- Bugfix: when using variables in the 'auth_basic_user_file' directive
a null character might appear in logs.
Thanks to Vadim Filimonov.
Patchnames
openSUSE-2019-195
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for nginx", "title": "Title of the patch" }, { "category": "description", "text": "This update for nginx fixes the following issues:\n\nnginx was updated to 1.14.2:\n\n- Bugfix: nginx could not be built on Fedora 28 Linux.\n- Bugfix: in handling of client addresses when using unix domain\n listen sockets to work with datagrams on Linux.\n- Change: the logging level of the \u0027http request\u0027, \u0027https proxy\n request\u0027, \u0027unsupported protocol\u0027, \u0027version too low\u0027,\n \u0027no suitable key share\u0027, and \u0027no suitable signature algorithm\u0027\n SSL errors has been lowered from \u0027crit\u0027 to \u0027info\u0027.\n- Bugfix: when using OpenSSL 1.1.0 or newer it was not possible\n to switch off \u0027ssl_prefer_server_ciphers\u0027 in a virtual server\n if it was switched on in the default server.\n- Bugfix: nginx could not be built with LibreSSL 2.8.0.\n- Bugfix: if nginx was built with OpenSSL 1.1.0 and used with\n OpenSSL 1.1.1, the TLS 1.3 protocol was always enabled.\n- Bugfix: sending a disk-buffered request body to a gRPC backend\n might fail.\n- Bugfix: connections with some gRPC backends might not be cached when\n using the \u0027keepalive\u0027 directive.\n- Bugfix: a segmentation fault might occur in a worker process if the\n ngx_http_mp4_module was used on 32-bit platforms.\n\nChanges with nginx 1.14.1:\n\n- Security: when using HTTP/2 a client might cause excessive memory\n consumption (CVE-2018-16843) and CPU usage (CVE-2018-16844).\n- Security: processing of a specially crafted mp4 file with the\n ngx_http_mp4_module might result in worker process memory disclosure\n (CVE-2018-16845).\n- Bugfix: working with gRPC backends might result in excessive memory\n consumption.\n\nChanges with nginx 1.13.12:\n\n- Bugfix: connections with gRPC backends might be closed unexpectedly\n when returning a large response.\n\nChanges with nginx 1.13.10\n\n- Feature: the \u0027set\u0027 parameter of the \u0027include\u0027 SSI \n directive now allows writing arbitrary responses to a\n variable; the \u0027subrequest_output_buffer_size\u0027 directive\n defines maximum response size.\n- Feature: now nginx uses clock_gettime(CLOCK_MONOTONIC) if available,\n to avoid timeouts being incorrectly triggered on system time changes.\n- Feature: the \u0027escape=none\u0027 parameter of the \u0027log_format\u0027 directive.\n Thanks to Johannes Baiter and Calin Don.\n- Feature: the $ssl_preread_alpn_protocols variable in the\n ngx_stream_ssl_preread_module.\n- Feature: the ngx_http_grpc_module.\n- Bugfix: in memory allocation error handling in the \u0027geo\u0027 directive.\n- Bugfix: when using variables in the \u0027auth_basic_user_file\u0027 directive\n a null character might appear in logs.\n Thanks to Vadim Filimonov.\n\n", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2019-195", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_0195-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2019:0195-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BANOBXLWHZASXZTGTJCX7HNMKYECPLOA/#BANOBXLWHZASXZTGTJCX7HNMKYECPLOA" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2019:0195-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BANOBXLWHZASXZTGTJCX7HNMKYECPLOA/#BANOBXLWHZASXZTGTJCX7HNMKYECPLOA" }, { "category": "self", "summary": "SUSE Bug 1115015", "url": "https://bugzilla.suse.com/1115015" }, { "category": "self", "summary": "SUSE Bug 1115022", "url": "https://bugzilla.suse.com/1115022" }, { "category": "self", "summary": "SUSE Bug 1115025", "url": "https://bugzilla.suse.com/1115025" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16843 page", "url": "https://www.suse.com/security/cve/CVE-2018-16843/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16844 page", "url": "https://www.suse.com/security/cve/CVE-2018-16844/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16845 page", "url": "https://www.suse.com/security/cve/CVE-2018-16845/" } ], "title": "Security update for nginx", "tracking": { "current_release_date": "2019-03-23T10:59:22Z", "generator": { "date": "2019-03-23T10:59:22Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2019:0195-1", "initial_release_date": "2019-03-23T10:59:22Z", "revision_history": [ { "date": "2019-03-23T10:59:22Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "nginx-1.14.2-16.1.aarch64", "product": { "name": "nginx-1.14.2-16.1.aarch64", "product_id": "nginx-1.14.2-16.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "vim-plugin-nginx-1.14.2-16.1.noarch", "product": { "name": "vim-plugin-nginx-1.14.2-16.1.noarch", "product_id": "vim-plugin-nginx-1.14.2-16.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "nginx-1.14.2-16.1.ppc64le", "product": { "name": "nginx-1.14.2-16.1.ppc64le", "product_id": "nginx-1.14.2-16.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "nginx-1.14.2-16.1.s390x", "product": { "name": "nginx-1.14.2-16.1.s390x", "product_id": "nginx-1.14.2-16.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "nginx-1.14.2-16.1.x86_64", "product": { "name": "nginx-1.14.2-16.1.x86_64", "product_id": "nginx-1.14.2-16.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Package Hub 12", "product": { "name": "SUSE Package Hub 12", "product_id": "SUSE Package Hub 12", "product_identification_helper": { "cpe": "cpe:/o:suse:packagehub:12" } } }, { "category": "product_name", "name": "openSUSE Leap 15.0", "product": { "name": "openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.0" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "nginx-1.14.2-16.1.aarch64 as component of SUSE Package Hub 12", "product_id": "SUSE Package Hub 12:nginx-1.14.2-16.1.aarch64" }, "product_reference": "nginx-1.14.2-16.1.aarch64", "relates_to_product_reference": "SUSE Package Hub 12" }, { "category": "default_component_of", "full_product_name": { "name": "nginx-1.14.2-16.1.ppc64le as component of SUSE Package Hub 12", "product_id": "SUSE Package Hub 12:nginx-1.14.2-16.1.ppc64le" }, "product_reference": "nginx-1.14.2-16.1.ppc64le", "relates_to_product_reference": "SUSE Package Hub 12" }, { "category": "default_component_of", "full_product_name": { "name": "nginx-1.14.2-16.1.s390x as component of SUSE Package Hub 12", "product_id": "SUSE Package Hub 12:nginx-1.14.2-16.1.s390x" }, "product_reference": "nginx-1.14.2-16.1.s390x", "relates_to_product_reference": "SUSE Package Hub 12" }, { "category": "default_component_of", "full_product_name": { "name": "nginx-1.14.2-16.1.x86_64 as component of SUSE Package Hub 12", "product_id": "SUSE Package Hub 12:nginx-1.14.2-16.1.x86_64" }, "product_reference": "nginx-1.14.2-16.1.x86_64", "relates_to_product_reference": "SUSE Package Hub 12" }, { "category": "default_component_of", "full_product_name": { "name": "vim-plugin-nginx-1.14.2-16.1.noarch as component of SUSE Package Hub 12", "product_id": "SUSE Package Hub 12:vim-plugin-nginx-1.14.2-16.1.noarch" }, "product_reference": "vim-plugin-nginx-1.14.2-16.1.noarch", "relates_to_product_reference": "SUSE Package Hub 12" }, { "category": "default_component_of", "full_product_name": { "name": "nginx-1.14.2-16.1.aarch64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:nginx-1.14.2-16.1.aarch64" }, "product_reference": "nginx-1.14.2-16.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "nginx-1.14.2-16.1.ppc64le as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:nginx-1.14.2-16.1.ppc64le" }, "product_reference": "nginx-1.14.2-16.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "nginx-1.14.2-16.1.s390x as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:nginx-1.14.2-16.1.s390x" }, "product_reference": "nginx-1.14.2-16.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "nginx-1.14.2-16.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:nginx-1.14.2-16.1.x86_64" }, "product_reference": "nginx-1.14.2-16.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "vim-plugin-nginx-1.14.2-16.1.noarch as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:vim-plugin-nginx-1.14.2-16.1.noarch" }, "product_reference": "vim-plugin-nginx-1.14.2-16.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.0" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-16843", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16843" } ], "notes": [ { "category": "general", "text": "nginx before versions 1.15.6 and 1.14.1 has a vulnerability in the implementation of HTTP/2 that can allow for excessive memory consumption. This issue affects nginx compiled with the ngx_http_v2_module (not compiled by default) if the \u0027http2\u0027 option of the \u0027listen\u0027 directive is used in a configuration file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 12:nginx-1.14.2-16.1.aarch64", "SUSE Package Hub 12:nginx-1.14.2-16.1.ppc64le", "SUSE Package Hub 12:nginx-1.14.2-16.1.s390x", "SUSE Package Hub 12:nginx-1.14.2-16.1.x86_64", "SUSE Package Hub 12:vim-plugin-nginx-1.14.2-16.1.noarch", "openSUSE Leap 15.0:nginx-1.14.2-16.1.aarch64", "openSUSE Leap 15.0:nginx-1.14.2-16.1.ppc64le", "openSUSE Leap 15.0:nginx-1.14.2-16.1.s390x", "openSUSE Leap 15.0:nginx-1.14.2-16.1.x86_64", "openSUSE Leap 15.0:vim-plugin-nginx-1.14.2-16.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16843", "url": "https://www.suse.com/security/cve/CVE-2018-16843" }, { "category": "external", "summary": "SUSE Bug 1115022 for CVE-2018-16843", "url": "https://bugzilla.suse.com/1115022" }, { "category": "external", "summary": "SUSE Bug 1115025 for CVE-2018-16843", "url": "https://bugzilla.suse.com/1115025" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 12:nginx-1.14.2-16.1.aarch64", "SUSE Package Hub 12:nginx-1.14.2-16.1.ppc64le", "SUSE Package Hub 12:nginx-1.14.2-16.1.s390x", "SUSE Package Hub 12:nginx-1.14.2-16.1.x86_64", "SUSE Package Hub 12:vim-plugin-nginx-1.14.2-16.1.noarch", "openSUSE Leap 15.0:nginx-1.14.2-16.1.aarch64", "openSUSE Leap 15.0:nginx-1.14.2-16.1.ppc64le", "openSUSE Leap 15.0:nginx-1.14.2-16.1.s390x", "openSUSE Leap 15.0:nginx-1.14.2-16.1.x86_64", "openSUSE Leap 15.0:vim-plugin-nginx-1.14.2-16.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Package Hub 12:nginx-1.14.2-16.1.aarch64", "SUSE Package Hub 12:nginx-1.14.2-16.1.ppc64le", "SUSE Package Hub 12:nginx-1.14.2-16.1.s390x", "SUSE Package Hub 12:nginx-1.14.2-16.1.x86_64", "SUSE Package Hub 12:vim-plugin-nginx-1.14.2-16.1.noarch", "openSUSE Leap 15.0:nginx-1.14.2-16.1.aarch64", "openSUSE Leap 15.0:nginx-1.14.2-16.1.ppc64le", "openSUSE Leap 15.0:nginx-1.14.2-16.1.s390x", "openSUSE Leap 15.0:nginx-1.14.2-16.1.x86_64", "openSUSE Leap 15.0:vim-plugin-nginx-1.14.2-16.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2019-03-23T10:59:22Z", "details": "moderate" } ], "title": "CVE-2018-16843" }, { "cve": "CVE-2018-16844", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16844" } ], "notes": [ { "category": "general", "text": "nginx before versions 1.15.6 and 1.14.1 has a vulnerability in the implementation of HTTP/2 that can allow for excessive CPU usage. This issue affects nginx compiled with the ngx_http_v2_module (not compiled by default) if the \u0027http2\u0027 option of the \u0027listen\u0027 directive is used in a configuration file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 12:nginx-1.14.2-16.1.aarch64", "SUSE Package Hub 12:nginx-1.14.2-16.1.ppc64le", "SUSE Package Hub 12:nginx-1.14.2-16.1.s390x", "SUSE Package Hub 12:nginx-1.14.2-16.1.x86_64", "SUSE Package Hub 12:vim-plugin-nginx-1.14.2-16.1.noarch", "openSUSE Leap 15.0:nginx-1.14.2-16.1.aarch64", "openSUSE Leap 15.0:nginx-1.14.2-16.1.ppc64le", "openSUSE Leap 15.0:nginx-1.14.2-16.1.s390x", "openSUSE Leap 15.0:nginx-1.14.2-16.1.x86_64", "openSUSE Leap 15.0:vim-plugin-nginx-1.14.2-16.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16844", "url": "https://www.suse.com/security/cve/CVE-2018-16844" }, { "category": "external", "summary": "SUSE Bug 1115022 for CVE-2018-16844", "url": "https://bugzilla.suse.com/1115022" }, { "category": "external", "summary": "SUSE Bug 1115025 for CVE-2018-16844", "url": "https://bugzilla.suse.com/1115025" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 12:nginx-1.14.2-16.1.aarch64", "SUSE Package Hub 12:nginx-1.14.2-16.1.ppc64le", "SUSE Package Hub 12:nginx-1.14.2-16.1.s390x", "SUSE Package Hub 12:nginx-1.14.2-16.1.x86_64", "SUSE Package Hub 12:vim-plugin-nginx-1.14.2-16.1.noarch", "openSUSE Leap 15.0:nginx-1.14.2-16.1.aarch64", "openSUSE Leap 15.0:nginx-1.14.2-16.1.ppc64le", "openSUSE Leap 15.0:nginx-1.14.2-16.1.s390x", "openSUSE Leap 15.0:nginx-1.14.2-16.1.x86_64", "openSUSE Leap 15.0:vim-plugin-nginx-1.14.2-16.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Package Hub 12:nginx-1.14.2-16.1.aarch64", "SUSE Package Hub 12:nginx-1.14.2-16.1.ppc64le", "SUSE Package Hub 12:nginx-1.14.2-16.1.s390x", "SUSE Package Hub 12:nginx-1.14.2-16.1.x86_64", "SUSE Package Hub 12:vim-plugin-nginx-1.14.2-16.1.noarch", "openSUSE Leap 15.0:nginx-1.14.2-16.1.aarch64", "openSUSE Leap 15.0:nginx-1.14.2-16.1.ppc64le", "openSUSE Leap 15.0:nginx-1.14.2-16.1.s390x", "openSUSE Leap 15.0:nginx-1.14.2-16.1.x86_64", "openSUSE Leap 15.0:vim-plugin-nginx-1.14.2-16.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2019-03-23T10:59:22Z", "details": "moderate" } ], "title": "CVE-2018-16844" }, { "cve": "CVE-2018-16845", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16845" } ], "notes": [ { "category": "general", "text": "nginx before versions 1.15.6, 1.14.1 has a vulnerability in the ngx_http_mp4_module, which might allow an attacker to cause infinite loop in a worker process, cause a worker process crash, or might result in worker process memory disclosure by using a specially crafted mp4 file. The issue only affects nginx if it is built with the ngx_http_mp4_module (the module is not built by default) and the .mp4. directive is used in the configuration file. Further, the attack is only possible if an attacker is able to trigger processing of a specially crafted mp4 file with the ngx_http_mp4_module.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 12:nginx-1.14.2-16.1.aarch64", "SUSE Package Hub 12:nginx-1.14.2-16.1.ppc64le", "SUSE Package Hub 12:nginx-1.14.2-16.1.s390x", "SUSE Package Hub 12:nginx-1.14.2-16.1.x86_64", "SUSE Package Hub 12:vim-plugin-nginx-1.14.2-16.1.noarch", "openSUSE Leap 15.0:nginx-1.14.2-16.1.aarch64", "openSUSE Leap 15.0:nginx-1.14.2-16.1.ppc64le", "openSUSE Leap 15.0:nginx-1.14.2-16.1.s390x", "openSUSE Leap 15.0:nginx-1.14.2-16.1.x86_64", "openSUSE Leap 15.0:vim-plugin-nginx-1.14.2-16.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16845", "url": "https://www.suse.com/security/cve/CVE-2018-16845" }, { "category": "external", "summary": "SUSE Bug 1115015 for CVE-2018-16845", "url": "https://bugzilla.suse.com/1115015" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 12:nginx-1.14.2-16.1.aarch64", "SUSE Package Hub 12:nginx-1.14.2-16.1.ppc64le", "SUSE Package Hub 12:nginx-1.14.2-16.1.s390x", "SUSE Package Hub 12:nginx-1.14.2-16.1.x86_64", "SUSE Package Hub 12:vim-plugin-nginx-1.14.2-16.1.noarch", "openSUSE Leap 15.0:nginx-1.14.2-16.1.aarch64", "openSUSE Leap 15.0:nginx-1.14.2-16.1.ppc64le", "openSUSE Leap 15.0:nginx-1.14.2-16.1.s390x", "openSUSE Leap 15.0:nginx-1.14.2-16.1.x86_64", "openSUSE Leap 15.0:vim-plugin-nginx-1.14.2-16.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Package Hub 12:nginx-1.14.2-16.1.aarch64", "SUSE Package Hub 12:nginx-1.14.2-16.1.ppc64le", "SUSE Package Hub 12:nginx-1.14.2-16.1.s390x", "SUSE Package Hub 12:nginx-1.14.2-16.1.x86_64", "SUSE Package Hub 12:vim-plugin-nginx-1.14.2-16.1.noarch", "openSUSE Leap 15.0:nginx-1.14.2-16.1.aarch64", "openSUSE Leap 15.0:nginx-1.14.2-16.1.ppc64le", "openSUSE Leap 15.0:nginx-1.14.2-16.1.s390x", "openSUSE Leap 15.0:nginx-1.14.2-16.1.x86_64", "openSUSE Leap 15.0:vim-plugin-nginx-1.14.2-16.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2019-03-23T10:59:22Z", "details": "important" } ], "title": "CVE-2018-16845" } ] }
opensuse-su-2019:2120-1
Vulnerability from csaf_opensuse
Published
2019-09-10 18:18
Modified
2019-09-10 18:18
Summary
Security update for nginx
Notes
Title of the patch
Security update for nginx
Description of the patch
This update for nginx fixes the following issues:
Security issues fixed:
- CVE-2019-9511: Fixed a denial of service by manipulating the window size and stream prioritization (bsc#1145579).
- CVE-2019-9513: Fixed a denial of service caused by resource loops (bsc#1145580).
- CVE-2019-9516: Fixed a denial of service caused by header leaks (bsc#1145582).
- CVE-2018-16845: Fixed denial of service and memory disclosure via mp4 module (bsc#1115015).
- CVE-2018-16843: Fixed excessive memory consumption in HTTP/2 implementation (bsc#1115022).
- CVE-2018-16844: Fixed excessive CPU usage via flaw in HTTP/2 implementation (bsc#1115025).
This update was imported from the SUSE:SLE-15-SP1:Update update project.
Patchnames
openSUSE-2019-2120
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for nginx", "title": "Title of the patch" }, { "category": "description", "text": "This update for nginx fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2019-9511: Fixed a denial of service by manipulating the window size and stream prioritization (bsc#1145579).\n- CVE-2019-9513: Fixed a denial of service caused by resource loops (bsc#1145580).\n- CVE-2019-9516: Fixed a denial of service caused by header leaks (bsc#1145582).\n- CVE-2018-16845: Fixed denial of service and memory disclosure via mp4 module (bsc#1115015).\n- CVE-2018-16843: Fixed excessive memory consumption in HTTP/2 implementation (bsc#1115022).\n- CVE-2018-16844: Fixed excessive CPU usage via flaw in HTTP/2 implementation (bsc#1115025).\n\nThis update was imported from the SUSE:SLE-15-SP1:Update update project.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2019-2120", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_2120-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2019:2120-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BWXBLC3WM4NT33YQW6VEXFVCPFVQE7FB/#BWXBLC3WM4NT33YQW6VEXFVCPFVQE7FB" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2019:2120-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BWXBLC3WM4NT33YQW6VEXFVCPFVQE7FB/#BWXBLC3WM4NT33YQW6VEXFVCPFVQE7FB" }, { "category": "self", "summary": "SUSE Bug 1115015", "url": "https://bugzilla.suse.com/1115015" }, { "category": "self", "summary": "SUSE Bug 1115022", "url": "https://bugzilla.suse.com/1115022" }, { "category": "self", "summary": "SUSE Bug 1115025", "url": "https://bugzilla.suse.com/1115025" }, { "category": "self", "summary": "SUSE Bug 1145579", "url": "https://bugzilla.suse.com/1145579" }, { "category": "self", "summary": "SUSE Bug 1145580", "url": "https://bugzilla.suse.com/1145580" }, { "category": "self", "summary": "SUSE Bug 1145582", "url": "https://bugzilla.suse.com/1145582" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16843 page", "url": "https://www.suse.com/security/cve/CVE-2018-16843/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16844 page", "url": "https://www.suse.com/security/cve/CVE-2018-16844/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16845 page", "url": "https://www.suse.com/security/cve/CVE-2018-16845/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9511 page", "url": "https://www.suse.com/security/cve/CVE-2019-9511/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9513 page", "url": "https://www.suse.com/security/cve/CVE-2019-9513/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9516 page", "url": "https://www.suse.com/security/cve/CVE-2019-9516/" } ], "title": "Security update for nginx", "tracking": { "current_release_date": "2019-09-10T18:18:07Z", "generator": { "date": "2019-09-10T18:18:07Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2019:2120-1", "initial_release_date": "2019-09-10T18:18:07Z", "revision_history": [ { "date": "2019-09-10T18:18:07Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "nginx-source-1.14.2-lp151.4.3.1.noarch", "product": { "name": "nginx-source-1.14.2-lp151.4.3.1.noarch", "product_id": "nginx-source-1.14.2-lp151.4.3.1.noarch" } }, { "category": "product_version", "name": "vim-plugin-nginx-1.14.2-lp151.4.3.1.noarch", "product": { "name": "vim-plugin-nginx-1.14.2-lp151.4.3.1.noarch", "product_id": "vim-plugin-nginx-1.14.2-lp151.4.3.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "nginx-1.14.2-lp151.4.3.1.x86_64", "product": { "name": "nginx-1.14.2-lp151.4.3.1.x86_64", "product_id": "nginx-1.14.2-lp151.4.3.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Leap 15.1", "product": { "name": "openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "nginx-1.14.2-lp151.4.3.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:nginx-1.14.2-lp151.4.3.1.x86_64" }, "product_reference": "nginx-1.14.2-lp151.4.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "nginx-source-1.14.2-lp151.4.3.1.noarch as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:nginx-source-1.14.2-lp151.4.3.1.noarch" }, "product_reference": "nginx-source-1.14.2-lp151.4.3.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "vim-plugin-nginx-1.14.2-lp151.4.3.1.noarch as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:vim-plugin-nginx-1.14.2-lp151.4.3.1.noarch" }, "product_reference": "vim-plugin-nginx-1.14.2-lp151.4.3.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-16843", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16843" } ], "notes": [ { "category": "general", "text": "nginx before versions 1.15.6 and 1.14.1 has a vulnerability in the implementation of HTTP/2 that can allow for excessive memory consumption. This issue affects nginx compiled with the ngx_http_v2_module (not compiled by default) if the \u0027http2\u0027 option of the \u0027listen\u0027 directive is used in a configuration file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:nginx-1.14.2-lp151.4.3.1.x86_64", "openSUSE Leap 15.1:nginx-source-1.14.2-lp151.4.3.1.noarch", "openSUSE Leap 15.1:vim-plugin-nginx-1.14.2-lp151.4.3.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16843", "url": "https://www.suse.com/security/cve/CVE-2018-16843" }, { "category": "external", "summary": "SUSE Bug 1115022 for CVE-2018-16843", "url": "https://bugzilla.suse.com/1115022" }, { "category": "external", "summary": "SUSE Bug 1115025 for CVE-2018-16843", "url": "https://bugzilla.suse.com/1115025" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:nginx-1.14.2-lp151.4.3.1.x86_64", "openSUSE Leap 15.1:nginx-source-1.14.2-lp151.4.3.1.noarch", "openSUSE Leap 15.1:vim-plugin-nginx-1.14.2-lp151.4.3.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Leap 15.1:nginx-1.14.2-lp151.4.3.1.x86_64", "openSUSE Leap 15.1:nginx-source-1.14.2-lp151.4.3.1.noarch", "openSUSE Leap 15.1:vim-plugin-nginx-1.14.2-lp151.4.3.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2019-09-10T18:18:07Z", "details": "moderate" } ], "title": "CVE-2018-16843" }, { "cve": "CVE-2018-16844", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16844" } ], "notes": [ { "category": "general", "text": "nginx before versions 1.15.6 and 1.14.1 has a vulnerability in the implementation of HTTP/2 that can allow for excessive CPU usage. This issue affects nginx compiled with the ngx_http_v2_module (not compiled by default) if the \u0027http2\u0027 option of the \u0027listen\u0027 directive is used in a configuration file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:nginx-1.14.2-lp151.4.3.1.x86_64", "openSUSE Leap 15.1:nginx-source-1.14.2-lp151.4.3.1.noarch", "openSUSE Leap 15.1:vim-plugin-nginx-1.14.2-lp151.4.3.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16844", "url": "https://www.suse.com/security/cve/CVE-2018-16844" }, { "category": "external", "summary": "SUSE Bug 1115022 for CVE-2018-16844", "url": "https://bugzilla.suse.com/1115022" }, { "category": "external", "summary": "SUSE Bug 1115025 for CVE-2018-16844", "url": "https://bugzilla.suse.com/1115025" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:nginx-1.14.2-lp151.4.3.1.x86_64", "openSUSE Leap 15.1:nginx-source-1.14.2-lp151.4.3.1.noarch", "openSUSE Leap 15.1:vim-plugin-nginx-1.14.2-lp151.4.3.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Leap 15.1:nginx-1.14.2-lp151.4.3.1.x86_64", "openSUSE Leap 15.1:nginx-source-1.14.2-lp151.4.3.1.noarch", "openSUSE Leap 15.1:vim-plugin-nginx-1.14.2-lp151.4.3.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2019-09-10T18:18:07Z", "details": "moderate" } ], "title": "CVE-2018-16844" }, { "cve": "CVE-2018-16845", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16845" } ], "notes": [ { "category": "general", "text": "nginx before versions 1.15.6, 1.14.1 has a vulnerability in the ngx_http_mp4_module, which might allow an attacker to cause infinite loop in a worker process, cause a worker process crash, or might result in worker process memory disclosure by using a specially crafted mp4 file. The issue only affects nginx if it is built with the ngx_http_mp4_module (the module is not built by default) and the .mp4. directive is used in the configuration file. Further, the attack is only possible if an attacker is able to trigger processing of a specially crafted mp4 file with the ngx_http_mp4_module.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:nginx-1.14.2-lp151.4.3.1.x86_64", "openSUSE Leap 15.1:nginx-source-1.14.2-lp151.4.3.1.noarch", "openSUSE Leap 15.1:vim-plugin-nginx-1.14.2-lp151.4.3.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16845", "url": "https://www.suse.com/security/cve/CVE-2018-16845" }, { "category": "external", "summary": "SUSE Bug 1115015 for CVE-2018-16845", "url": "https://bugzilla.suse.com/1115015" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:nginx-1.14.2-lp151.4.3.1.x86_64", "openSUSE Leap 15.1:nginx-source-1.14.2-lp151.4.3.1.noarch", "openSUSE Leap 15.1:vim-plugin-nginx-1.14.2-lp151.4.3.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Leap 15.1:nginx-1.14.2-lp151.4.3.1.x86_64", "openSUSE Leap 15.1:nginx-source-1.14.2-lp151.4.3.1.noarch", "openSUSE Leap 15.1:vim-plugin-nginx-1.14.2-lp151.4.3.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2019-09-10T18:18:07Z", "details": "important" } ], "title": "CVE-2018-16845" }, { "cve": "CVE-2019-9511", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9511" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:nginx-1.14.2-lp151.4.3.1.x86_64", "openSUSE Leap 15.1:nginx-source-1.14.2-lp151.4.3.1.noarch", "openSUSE Leap 15.1:vim-plugin-nginx-1.14.2-lp151.4.3.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9511", "url": "https://www.suse.com/security/cve/CVE-2019-9511" }, { "category": "external", "summary": "SUSE Bug 1145579 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1145579" }, { "category": "external", "summary": "SUSE Bug 1146091 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1146091" }, { "category": "external", "summary": "SUSE Bug 1146182 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1146182" }, { "category": "external", "summary": "SUSE Bug 1193427 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1193427" }, { "category": "external", "summary": "SUSE Bug 1202787 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1202787" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:nginx-1.14.2-lp151.4.3.1.x86_64", "openSUSE Leap 15.1:nginx-source-1.14.2-lp151.4.3.1.noarch", "openSUSE Leap 15.1:vim-plugin-nginx-1.14.2-lp151.4.3.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Leap 15.1:nginx-1.14.2-lp151.4.3.1.x86_64", "openSUSE Leap 15.1:nginx-source-1.14.2-lp151.4.3.1.noarch", "openSUSE Leap 15.1:vim-plugin-nginx-1.14.2-lp151.4.3.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2019-09-10T18:18:07Z", "details": "low" } ], "title": "CVE-2019-9511" }, { "cve": "CVE-2019-9513", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9513" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:nginx-1.14.2-lp151.4.3.1.x86_64", "openSUSE Leap 15.1:nginx-source-1.14.2-lp151.4.3.1.noarch", "openSUSE Leap 15.1:vim-plugin-nginx-1.14.2-lp151.4.3.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9513", "url": "https://www.suse.com/security/cve/CVE-2019-9513" }, { "category": "external", "summary": "SUSE Bug 1145580 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1145580" }, { "category": "external", "summary": "SUSE Bug 1146094 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1146094" }, { "category": "external", "summary": "SUSE Bug 1146184 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1146184" }, { "category": "external", "summary": "SUSE Bug 1193427 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1193427" }, { "category": "external", "summary": "SUSE Bug 1202787 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1202787" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:nginx-1.14.2-lp151.4.3.1.x86_64", "openSUSE Leap 15.1:nginx-source-1.14.2-lp151.4.3.1.noarch", "openSUSE Leap 15.1:vim-plugin-nginx-1.14.2-lp151.4.3.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Leap 15.1:nginx-1.14.2-lp151.4.3.1.x86_64", "openSUSE Leap 15.1:nginx-source-1.14.2-lp151.4.3.1.noarch", "openSUSE Leap 15.1:vim-plugin-nginx-1.14.2-lp151.4.3.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2019-09-10T18:18:07Z", "details": "low" } ], "title": "CVE-2019-9513" }, { "cve": "CVE-2019-9516", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9516" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service. The attacker sends a stream of headers with a 0-length header name and 0-length header value, optionally Huffman encoded into 1-byte or greater headers. Some implementations allocate memory for these headers and keep the allocation alive until the session dies. This can consume excess memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:nginx-1.14.2-lp151.4.3.1.x86_64", "openSUSE Leap 15.1:nginx-source-1.14.2-lp151.4.3.1.noarch", "openSUSE Leap 15.1:vim-plugin-nginx-1.14.2-lp151.4.3.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9516", "url": "https://www.suse.com/security/cve/CVE-2019-9516" }, { "category": "external", "summary": "SUSE Bug 1145582 for CVE-2019-9516", "url": "https://bugzilla.suse.com/1145582" }, { "category": "external", "summary": "SUSE Bug 1146090 for CVE-2019-9516", "url": "https://bugzilla.suse.com/1146090" }, { "category": "external", "summary": "SUSE Bug 1193427 for CVE-2019-9516", "url": "https://bugzilla.suse.com/1193427" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:nginx-1.14.2-lp151.4.3.1.x86_64", "openSUSE Leap 15.1:nginx-source-1.14.2-lp151.4.3.1.noarch", "openSUSE Leap 15.1:vim-plugin-nginx-1.14.2-lp151.4.3.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Leap 15.1:nginx-1.14.2-lp151.4.3.1.x86_64", "openSUSE Leap 15.1:nginx-source-1.14.2-lp151.4.3.1.noarch", "openSUSE Leap 15.1:vim-plugin-nginx-1.14.2-lp151.4.3.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2019-09-10T18:18:07Z", "details": "low" } ], "title": "CVE-2019-9516" } ] }
opensuse-su-2024:11092-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
nginx-1.21.3-1.4 on GA media
Notes
Title of the patch
nginx-1.21.3-1.4 on GA media
Description of the patch
These are all security issues fixed in the nginx-1.21.3-1.4 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-11092
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "nginx-1.21.3-1.4 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the nginx-1.21.3-1.4 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-11092", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11092-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7529 page", "url": "https://www.suse.com/security/cve/CVE-2017-7529/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16843 page", "url": "https://www.suse.com/security/cve/CVE-2018-16843/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16845 page", "url": "https://www.suse.com/security/cve/CVE-2018-16845/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20372 page", "url": "https://www.suse.com/security/cve/CVE-2019-20372/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9511 page", "url": "https://www.suse.com/security/cve/CVE-2019-9511/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9516 page", "url": "https://www.suse.com/security/cve/CVE-2019-9516/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-23017 page", "url": "https://www.suse.com/security/cve/CVE-2021-23017/" } ], "title": "nginx-1.21.3-1.4 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:11092-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "nginx-1.21.3-1.4.aarch64", "product": { "name": "nginx-1.21.3-1.4.aarch64", "product_id": "nginx-1.21.3-1.4.aarch64" } }, { "category": "product_version", "name": "nginx-source-1.21.3-1.4.aarch64", "product": { "name": "nginx-source-1.21.3-1.4.aarch64", "product_id": "nginx-source-1.21.3-1.4.aarch64" } }, { "category": "product_version", "name": "vim-plugin-nginx-1.21.3-1.4.aarch64", "product": { "name": "vim-plugin-nginx-1.21.3-1.4.aarch64", "product_id": "vim-plugin-nginx-1.21.3-1.4.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "nginx-1.21.3-1.4.ppc64le", "product": { "name": "nginx-1.21.3-1.4.ppc64le", "product_id": "nginx-1.21.3-1.4.ppc64le" } }, { "category": "product_version", "name": "nginx-source-1.21.3-1.4.ppc64le", "product": { "name": "nginx-source-1.21.3-1.4.ppc64le", "product_id": "nginx-source-1.21.3-1.4.ppc64le" } }, { "category": "product_version", "name": "vim-plugin-nginx-1.21.3-1.4.ppc64le", "product": { "name": "vim-plugin-nginx-1.21.3-1.4.ppc64le", "product_id": "vim-plugin-nginx-1.21.3-1.4.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "nginx-1.21.3-1.4.s390x", "product": { "name": "nginx-1.21.3-1.4.s390x", "product_id": "nginx-1.21.3-1.4.s390x" } }, { "category": "product_version", "name": "nginx-source-1.21.3-1.4.s390x", "product": { "name": "nginx-source-1.21.3-1.4.s390x", "product_id": "nginx-source-1.21.3-1.4.s390x" } }, { "category": "product_version", "name": "vim-plugin-nginx-1.21.3-1.4.s390x", "product": { "name": "vim-plugin-nginx-1.21.3-1.4.s390x", "product_id": "vim-plugin-nginx-1.21.3-1.4.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "nginx-1.21.3-1.4.x86_64", "product": { "name": "nginx-1.21.3-1.4.x86_64", "product_id": "nginx-1.21.3-1.4.x86_64" } }, { "category": "product_version", "name": "nginx-source-1.21.3-1.4.x86_64", "product": { "name": "nginx-source-1.21.3-1.4.x86_64", "product_id": "nginx-source-1.21.3-1.4.x86_64" } }, { "category": "product_version", "name": "vim-plugin-nginx-1.21.3-1.4.x86_64", "product": { "name": "vim-plugin-nginx-1.21.3-1.4.x86_64", "product_id": "vim-plugin-nginx-1.21.3-1.4.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "nginx-1.21.3-1.4.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:nginx-1.21.3-1.4.aarch64" }, "product_reference": "nginx-1.21.3-1.4.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "nginx-1.21.3-1.4.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:nginx-1.21.3-1.4.ppc64le" }, "product_reference": "nginx-1.21.3-1.4.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "nginx-1.21.3-1.4.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:nginx-1.21.3-1.4.s390x" }, "product_reference": "nginx-1.21.3-1.4.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "nginx-1.21.3-1.4.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:nginx-1.21.3-1.4.x86_64" }, "product_reference": "nginx-1.21.3-1.4.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "nginx-source-1.21.3-1.4.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:nginx-source-1.21.3-1.4.aarch64" }, "product_reference": "nginx-source-1.21.3-1.4.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "nginx-source-1.21.3-1.4.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:nginx-source-1.21.3-1.4.ppc64le" }, "product_reference": "nginx-source-1.21.3-1.4.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "nginx-source-1.21.3-1.4.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:nginx-source-1.21.3-1.4.s390x" }, "product_reference": "nginx-source-1.21.3-1.4.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "nginx-source-1.21.3-1.4.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:nginx-source-1.21.3-1.4.x86_64" }, "product_reference": "nginx-source-1.21.3-1.4.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "vim-plugin-nginx-1.21.3-1.4.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4.aarch64" }, "product_reference": "vim-plugin-nginx-1.21.3-1.4.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "vim-plugin-nginx-1.21.3-1.4.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4.ppc64le" }, "product_reference": "vim-plugin-nginx-1.21.3-1.4.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "vim-plugin-nginx-1.21.3-1.4.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4.s390x" }, "product_reference": "vim-plugin-nginx-1.21.3-1.4.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "vim-plugin-nginx-1.21.3-1.4.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4.x86_64" }, "product_reference": "vim-plugin-nginx-1.21.3-1.4.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-7529", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7529" } ], "notes": [ { "category": "general", "text": "Nginx versions since 0.5.6 up to and including 1.13.2 are vulnerable to integer overflow vulnerability in nginx range filter module resulting into leak of potentially sensitive information triggered by specially crafted request.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:nginx-1.21.3-1.4.aarch64", "openSUSE Tumbleweed:nginx-1.21.3-1.4.ppc64le", "openSUSE Tumbleweed:nginx-1.21.3-1.4.s390x", "openSUSE Tumbleweed:nginx-1.21.3-1.4.x86_64", "openSUSE Tumbleweed:nginx-source-1.21.3-1.4.aarch64", "openSUSE Tumbleweed:nginx-source-1.21.3-1.4.ppc64le", "openSUSE Tumbleweed:nginx-source-1.21.3-1.4.s390x", "openSUSE Tumbleweed:nginx-source-1.21.3-1.4.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7529", "url": "https://www.suse.com/security/cve/CVE-2017-7529" }, { "category": "external", "summary": "SUSE Bug 1048265 for CVE-2017-7529", "url": "https://bugzilla.suse.com/1048265" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:nginx-1.21.3-1.4.aarch64", "openSUSE Tumbleweed:nginx-1.21.3-1.4.ppc64le", "openSUSE Tumbleweed:nginx-1.21.3-1.4.s390x", "openSUSE Tumbleweed:nginx-1.21.3-1.4.x86_64", "openSUSE Tumbleweed:nginx-source-1.21.3-1.4.aarch64", "openSUSE Tumbleweed:nginx-source-1.21.3-1.4.ppc64le", "openSUSE Tumbleweed:nginx-source-1.21.3-1.4.s390x", "openSUSE Tumbleweed:nginx-source-1.21.3-1.4.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:nginx-1.21.3-1.4.aarch64", "openSUSE Tumbleweed:nginx-1.21.3-1.4.ppc64le", "openSUSE Tumbleweed:nginx-1.21.3-1.4.s390x", "openSUSE Tumbleweed:nginx-1.21.3-1.4.x86_64", "openSUSE Tumbleweed:nginx-source-1.21.3-1.4.aarch64", "openSUSE Tumbleweed:nginx-source-1.21.3-1.4.ppc64le", "openSUSE Tumbleweed:nginx-source-1.21.3-1.4.s390x", "openSUSE Tumbleweed:nginx-source-1.21.3-1.4.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-7529" }, { "cve": "CVE-2018-16843", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16843" } ], "notes": [ { "category": "general", "text": "nginx before versions 1.15.6 and 1.14.1 has a vulnerability in the implementation of HTTP/2 that can allow for excessive memory consumption. This issue affects nginx compiled with the ngx_http_v2_module (not compiled by default) if the \u0027http2\u0027 option of the \u0027listen\u0027 directive is used in a configuration file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:nginx-1.21.3-1.4.aarch64", "openSUSE Tumbleweed:nginx-1.21.3-1.4.ppc64le", "openSUSE Tumbleweed:nginx-1.21.3-1.4.s390x", "openSUSE Tumbleweed:nginx-1.21.3-1.4.x86_64", "openSUSE Tumbleweed:nginx-source-1.21.3-1.4.aarch64", "openSUSE Tumbleweed:nginx-source-1.21.3-1.4.ppc64le", "openSUSE Tumbleweed:nginx-source-1.21.3-1.4.s390x", "openSUSE Tumbleweed:nginx-source-1.21.3-1.4.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16843", "url": "https://www.suse.com/security/cve/CVE-2018-16843" }, { "category": "external", "summary": "SUSE Bug 1115022 for CVE-2018-16843", "url": "https://bugzilla.suse.com/1115022" }, { "category": "external", "summary": "SUSE Bug 1115025 for CVE-2018-16843", "url": "https://bugzilla.suse.com/1115025" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:nginx-1.21.3-1.4.aarch64", "openSUSE Tumbleweed:nginx-1.21.3-1.4.ppc64le", "openSUSE Tumbleweed:nginx-1.21.3-1.4.s390x", "openSUSE Tumbleweed:nginx-1.21.3-1.4.x86_64", "openSUSE Tumbleweed:nginx-source-1.21.3-1.4.aarch64", "openSUSE Tumbleweed:nginx-source-1.21.3-1.4.ppc64le", "openSUSE Tumbleweed:nginx-source-1.21.3-1.4.s390x", "openSUSE Tumbleweed:nginx-source-1.21.3-1.4.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:nginx-1.21.3-1.4.aarch64", "openSUSE Tumbleweed:nginx-1.21.3-1.4.ppc64le", "openSUSE Tumbleweed:nginx-1.21.3-1.4.s390x", "openSUSE Tumbleweed:nginx-1.21.3-1.4.x86_64", "openSUSE Tumbleweed:nginx-source-1.21.3-1.4.aarch64", "openSUSE Tumbleweed:nginx-source-1.21.3-1.4.ppc64le", "openSUSE Tumbleweed:nginx-source-1.21.3-1.4.s390x", "openSUSE Tumbleweed:nginx-source-1.21.3-1.4.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-16843" }, { "cve": "CVE-2018-16845", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16845" } ], "notes": [ { "category": "general", "text": "nginx before versions 1.15.6, 1.14.1 has a vulnerability in the ngx_http_mp4_module, which might allow an attacker to cause infinite loop in a worker process, cause a worker process crash, or might result in worker process memory disclosure by using a specially crafted mp4 file. The issue only affects nginx if it is built with the ngx_http_mp4_module (the module is not built by default) and the .mp4. directive is used in the configuration file. Further, the attack is only possible if an attacker is able to trigger processing of a specially crafted mp4 file with the ngx_http_mp4_module.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:nginx-1.21.3-1.4.aarch64", "openSUSE Tumbleweed:nginx-1.21.3-1.4.ppc64le", "openSUSE Tumbleweed:nginx-1.21.3-1.4.s390x", "openSUSE Tumbleweed:nginx-1.21.3-1.4.x86_64", "openSUSE Tumbleweed:nginx-source-1.21.3-1.4.aarch64", "openSUSE Tumbleweed:nginx-source-1.21.3-1.4.ppc64le", "openSUSE Tumbleweed:nginx-source-1.21.3-1.4.s390x", "openSUSE Tumbleweed:nginx-source-1.21.3-1.4.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16845", "url": "https://www.suse.com/security/cve/CVE-2018-16845" }, { "category": "external", "summary": "SUSE Bug 1115015 for CVE-2018-16845", "url": "https://bugzilla.suse.com/1115015" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:nginx-1.21.3-1.4.aarch64", "openSUSE Tumbleweed:nginx-1.21.3-1.4.ppc64le", "openSUSE Tumbleweed:nginx-1.21.3-1.4.s390x", "openSUSE Tumbleweed:nginx-1.21.3-1.4.x86_64", "openSUSE Tumbleweed:nginx-source-1.21.3-1.4.aarch64", "openSUSE Tumbleweed:nginx-source-1.21.3-1.4.ppc64le", "openSUSE Tumbleweed:nginx-source-1.21.3-1.4.s390x", "openSUSE Tumbleweed:nginx-source-1.21.3-1.4.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:nginx-1.21.3-1.4.aarch64", "openSUSE Tumbleweed:nginx-1.21.3-1.4.ppc64le", "openSUSE Tumbleweed:nginx-1.21.3-1.4.s390x", "openSUSE Tumbleweed:nginx-1.21.3-1.4.x86_64", "openSUSE Tumbleweed:nginx-source-1.21.3-1.4.aarch64", "openSUSE Tumbleweed:nginx-source-1.21.3-1.4.ppc64le", "openSUSE Tumbleweed:nginx-source-1.21.3-1.4.s390x", "openSUSE Tumbleweed:nginx-source-1.21.3-1.4.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-16845" }, { "cve": "CVE-2019-20372", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-20372" } ], "notes": [ { "category": "general", "text": "NGINX before 1.17.7, with certain error_page configurations, allows HTTP request smuggling, as demonstrated by the ability of an attacker to read unauthorized web pages in environments where NGINX is being fronted by a load balancer.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:nginx-1.21.3-1.4.aarch64", "openSUSE Tumbleweed:nginx-1.21.3-1.4.ppc64le", "openSUSE Tumbleweed:nginx-1.21.3-1.4.s390x", "openSUSE Tumbleweed:nginx-1.21.3-1.4.x86_64", "openSUSE Tumbleweed:nginx-source-1.21.3-1.4.aarch64", "openSUSE Tumbleweed:nginx-source-1.21.3-1.4.ppc64le", "openSUSE Tumbleweed:nginx-source-1.21.3-1.4.s390x", "openSUSE Tumbleweed:nginx-source-1.21.3-1.4.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-20372", "url": "https://www.suse.com/security/cve/CVE-2019-20372" }, { "category": "external", "summary": "SUSE Bug 1160682 for CVE-2019-20372", "url": "https://bugzilla.suse.com/1160682" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:nginx-1.21.3-1.4.aarch64", "openSUSE Tumbleweed:nginx-1.21.3-1.4.ppc64le", "openSUSE Tumbleweed:nginx-1.21.3-1.4.s390x", "openSUSE Tumbleweed:nginx-1.21.3-1.4.x86_64", "openSUSE Tumbleweed:nginx-source-1.21.3-1.4.aarch64", "openSUSE Tumbleweed:nginx-source-1.21.3-1.4.ppc64le", "openSUSE Tumbleweed:nginx-source-1.21.3-1.4.s390x", "openSUSE Tumbleweed:nginx-source-1.21.3-1.4.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:nginx-1.21.3-1.4.aarch64", "openSUSE Tumbleweed:nginx-1.21.3-1.4.ppc64le", "openSUSE Tumbleweed:nginx-1.21.3-1.4.s390x", "openSUSE Tumbleweed:nginx-1.21.3-1.4.x86_64", "openSUSE Tumbleweed:nginx-source-1.21.3-1.4.aarch64", "openSUSE Tumbleweed:nginx-source-1.21.3-1.4.ppc64le", "openSUSE Tumbleweed:nginx-source-1.21.3-1.4.s390x", "openSUSE Tumbleweed:nginx-source-1.21.3-1.4.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-20372" }, { "cve": "CVE-2019-9511", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9511" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:nginx-1.21.3-1.4.aarch64", "openSUSE Tumbleweed:nginx-1.21.3-1.4.ppc64le", "openSUSE Tumbleweed:nginx-1.21.3-1.4.s390x", "openSUSE Tumbleweed:nginx-1.21.3-1.4.x86_64", "openSUSE Tumbleweed:nginx-source-1.21.3-1.4.aarch64", "openSUSE Tumbleweed:nginx-source-1.21.3-1.4.ppc64le", "openSUSE Tumbleweed:nginx-source-1.21.3-1.4.s390x", "openSUSE Tumbleweed:nginx-source-1.21.3-1.4.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9511", "url": "https://www.suse.com/security/cve/CVE-2019-9511" }, { "category": "external", "summary": "SUSE Bug 1145579 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1145579" }, { "category": "external", "summary": "SUSE Bug 1146091 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1146091" }, { "category": "external", "summary": "SUSE Bug 1146182 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1146182" }, { "category": "external", "summary": "SUSE Bug 1193427 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1193427" }, { "category": "external", "summary": "SUSE Bug 1202787 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1202787" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:nginx-1.21.3-1.4.aarch64", "openSUSE Tumbleweed:nginx-1.21.3-1.4.ppc64le", "openSUSE Tumbleweed:nginx-1.21.3-1.4.s390x", "openSUSE Tumbleweed:nginx-1.21.3-1.4.x86_64", "openSUSE Tumbleweed:nginx-source-1.21.3-1.4.aarch64", "openSUSE Tumbleweed:nginx-source-1.21.3-1.4.ppc64le", "openSUSE Tumbleweed:nginx-source-1.21.3-1.4.s390x", "openSUSE Tumbleweed:nginx-source-1.21.3-1.4.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:nginx-1.21.3-1.4.aarch64", "openSUSE Tumbleweed:nginx-1.21.3-1.4.ppc64le", "openSUSE Tumbleweed:nginx-1.21.3-1.4.s390x", "openSUSE Tumbleweed:nginx-1.21.3-1.4.x86_64", "openSUSE Tumbleweed:nginx-source-1.21.3-1.4.aarch64", "openSUSE Tumbleweed:nginx-source-1.21.3-1.4.ppc64le", "openSUSE Tumbleweed:nginx-source-1.21.3-1.4.s390x", "openSUSE Tumbleweed:nginx-source-1.21.3-1.4.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2019-9511" }, { "cve": "CVE-2019-9516", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9516" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service. The attacker sends a stream of headers with a 0-length header name and 0-length header value, optionally Huffman encoded into 1-byte or greater headers. Some implementations allocate memory for these headers and keep the allocation alive until the session dies. This can consume excess memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:nginx-1.21.3-1.4.aarch64", "openSUSE Tumbleweed:nginx-1.21.3-1.4.ppc64le", "openSUSE Tumbleweed:nginx-1.21.3-1.4.s390x", "openSUSE Tumbleweed:nginx-1.21.3-1.4.x86_64", "openSUSE Tumbleweed:nginx-source-1.21.3-1.4.aarch64", "openSUSE Tumbleweed:nginx-source-1.21.3-1.4.ppc64le", "openSUSE Tumbleweed:nginx-source-1.21.3-1.4.s390x", "openSUSE Tumbleweed:nginx-source-1.21.3-1.4.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9516", "url": "https://www.suse.com/security/cve/CVE-2019-9516" }, { "category": "external", "summary": "SUSE Bug 1145582 for CVE-2019-9516", "url": "https://bugzilla.suse.com/1145582" }, { "category": "external", "summary": "SUSE Bug 1146090 for CVE-2019-9516", "url": "https://bugzilla.suse.com/1146090" }, { "category": "external", "summary": "SUSE Bug 1193427 for CVE-2019-9516", "url": "https://bugzilla.suse.com/1193427" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:nginx-1.21.3-1.4.aarch64", "openSUSE Tumbleweed:nginx-1.21.3-1.4.ppc64le", "openSUSE Tumbleweed:nginx-1.21.3-1.4.s390x", "openSUSE Tumbleweed:nginx-1.21.3-1.4.x86_64", "openSUSE Tumbleweed:nginx-source-1.21.3-1.4.aarch64", "openSUSE Tumbleweed:nginx-source-1.21.3-1.4.ppc64le", "openSUSE Tumbleweed:nginx-source-1.21.3-1.4.s390x", "openSUSE Tumbleweed:nginx-source-1.21.3-1.4.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:nginx-1.21.3-1.4.aarch64", "openSUSE Tumbleweed:nginx-1.21.3-1.4.ppc64le", "openSUSE Tumbleweed:nginx-1.21.3-1.4.s390x", "openSUSE Tumbleweed:nginx-1.21.3-1.4.x86_64", "openSUSE Tumbleweed:nginx-source-1.21.3-1.4.aarch64", "openSUSE Tumbleweed:nginx-source-1.21.3-1.4.ppc64le", "openSUSE Tumbleweed:nginx-source-1.21.3-1.4.s390x", "openSUSE Tumbleweed:nginx-source-1.21.3-1.4.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2019-9516" }, { "cve": "CVE-2021-23017", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-23017" } ], "notes": [ { "category": "general", "text": "A security issue in nginx resolver was identified, which might allow an attacker who is able to forge UDP packets from the DNS server to cause 1-byte memory overwrite, resulting in worker process crash or potential other impact.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:nginx-1.21.3-1.4.aarch64", "openSUSE Tumbleweed:nginx-1.21.3-1.4.ppc64le", "openSUSE Tumbleweed:nginx-1.21.3-1.4.s390x", "openSUSE Tumbleweed:nginx-1.21.3-1.4.x86_64", "openSUSE Tumbleweed:nginx-source-1.21.3-1.4.aarch64", "openSUSE Tumbleweed:nginx-source-1.21.3-1.4.ppc64le", "openSUSE Tumbleweed:nginx-source-1.21.3-1.4.s390x", "openSUSE Tumbleweed:nginx-source-1.21.3-1.4.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-23017", "url": "https://www.suse.com/security/cve/CVE-2021-23017" }, { "category": "external", "summary": "SUSE Bug 1186126 for CVE-2021-23017", "url": "https://bugzilla.suse.com/1186126" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:nginx-1.21.3-1.4.aarch64", "openSUSE Tumbleweed:nginx-1.21.3-1.4.ppc64le", "openSUSE Tumbleweed:nginx-1.21.3-1.4.s390x", "openSUSE Tumbleweed:nginx-1.21.3-1.4.x86_64", "openSUSE Tumbleweed:nginx-source-1.21.3-1.4.aarch64", "openSUSE Tumbleweed:nginx-source-1.21.3-1.4.ppc64le", "openSUSE Tumbleweed:nginx-source-1.21.3-1.4.s390x", "openSUSE Tumbleweed:nginx-source-1.21.3-1.4.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:nginx-1.21.3-1.4.aarch64", "openSUSE Tumbleweed:nginx-1.21.3-1.4.ppc64le", "openSUSE Tumbleweed:nginx-1.21.3-1.4.s390x", "openSUSE Tumbleweed:nginx-1.21.3-1.4.x86_64", "openSUSE Tumbleweed:nginx-source-1.21.3-1.4.aarch64", "openSUSE Tumbleweed:nginx-source-1.21.3-1.4.ppc64le", "openSUSE Tumbleweed:nginx-source-1.21.3-1.4.s390x", "openSUSE Tumbleweed:nginx-source-1.21.3-1.4.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-23017" } ] }
suse-su-2019:0334-1
Vulnerability from csaf_suse
Published
2019-02-12 12:58
Modified
2019-02-12 12:58
Summary
Security update for nginx
Notes
Title of the patch
Security update for nginx
Description of the patch
This update for nginx to version 1.14.2 fixes the following issues:
Security vulnerabilities addressed:
- CVE-2018-16843 CVE-2018-16844: Fixed an issue whereby a client using HTTP/2
might cause excessive memory consumption and CPU usage (bsc#1115025 bsc#1115022).
- CVE-2018-16845: Fixed an issue which might result in worker process memory
disclosure whne processing of a specially crafted mp4 file with the
ngx_http_mp4_module (bsc#1115015).
Other bug fixes and changes made:
- Fixed an issue with handling of client addresses when using unix domain
listen sockets to work with datagrams on Linux.
- The logging level of the 'http request', 'https proxy request',
'unsupported protocol', 'version too low', 'no suitable key share', and
'no suitable signature algorithm' SSL errors has been lowered from 'crit' to
'info'.
- Fixed an issue with using OpenSSL 1.1.0 or newer it was not possible
to switch off 'ssl_prefer_server_ciphers' in a virtual server
if it was switched on in the default server.
- Fixed an issue with TLS 1.3 always being enabled when built with OpenSSL
1.1.0 and used with 1.1.1
- Fixed an issue with sending a disk-buffered request body to a gRPC backend
- Fixed an issue with connections of some gRPC backends might not be cached when
using the 'keepalive' directive.
- Fixed a segmentation fault, which might occur in a worker process if the
ngx_http_mp4_module was used on 32-bit platforms.
- Fixed an issue, whereby working with gRPC backends might result in excessive
memory consumption.
Patchnames
SUSE-2019-334,SUSE-SLE-Module-Development-Tools-OBS-15-2019-334,SUSE-SLE-Module-Server-Applications-15-2019-334
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for nginx", "title": "Title of the patch" }, { "category": "description", "text": "This update for nginx to version 1.14.2 fixes the following issues:\n\nSecurity vulnerabilities addressed:\n\n- CVE-2018-16843 CVE-2018-16844: Fixed an issue whereby a client using HTTP/2\n might cause excessive memory consumption and CPU usage (bsc#1115025 bsc#1115022).\n- CVE-2018-16845: Fixed an issue which might result in worker process memory\n disclosure whne processing of a specially crafted mp4 file with the\n ngx_http_mp4_module (bsc#1115015).\n\nOther bug fixes and changes made:\n\n- Fixed an issue with handling of client addresses when using unix domain\n listen sockets to work with datagrams on Linux.\n- The logging level of the \u0027http request\u0027, \u0027https proxy request\u0027,\n \u0027unsupported protocol\u0027, \u0027version too low\u0027, \u0027no suitable key share\u0027, and\n \u0027no suitable signature algorithm\u0027 SSL errors has been lowered from \u0027crit\u0027 to\n \u0027info\u0027.\n- Fixed an issue with using OpenSSL 1.1.0 or newer it was not possible\n to switch off \u0027ssl_prefer_server_ciphers\u0027 in a virtual server\n if it was switched on in the default server.\n- Fixed an issue with TLS 1.3 always being enabled when built with OpenSSL\n 1.1.0 and used with 1.1.1\n- Fixed an issue with sending a disk-buffered request body to a gRPC backend\n- Fixed an issue with connections of some gRPC backends might not be cached when\n using the \u0027keepalive\u0027 directive.\n- Fixed a segmentation fault, which might occur in a worker process if the\n ngx_http_mp4_module was used on 32-bit platforms.\n- Fixed an issue, whereby working with gRPC backends might result in excessive\n memory consumption.\n ", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2019-334,SUSE-SLE-Module-Development-Tools-OBS-15-2019-334,SUSE-SLE-Module-Server-Applications-15-2019-334", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_0334-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:0334-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20190334-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:0334-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2019-February/005106.html" }, { "category": "self", "summary": "SUSE Bug 1115015", "url": "https://bugzilla.suse.com/1115015" }, { "category": "self", "summary": "SUSE Bug 1115022", "url": "https://bugzilla.suse.com/1115022" }, { "category": "self", "summary": "SUSE Bug 1115025", "url": "https://bugzilla.suse.com/1115025" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16843 page", "url": "https://www.suse.com/security/cve/CVE-2018-16843/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16844 page", "url": "https://www.suse.com/security/cve/CVE-2018-16844/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16845 page", "url": "https://www.suse.com/security/cve/CVE-2018-16845/" } ], "title": "Security update for nginx", "tracking": { "current_release_date": "2019-02-12T12:58:43Z", "generator": { "date": "2019-02-12T12:58:43Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:0334-1", "initial_release_date": "2019-02-12T12:58:43Z", "revision_history": [ { "date": "2019-02-12T12:58:43Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "nginx-1.14.2-3.3.1.aarch64", "product": { "name": "nginx-1.14.2-3.3.1.aarch64", "product_id": "nginx-1.14.2-3.3.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "nginx-1.14.2-3.3.1.i586", "product": { "name": "nginx-1.14.2-3.3.1.i586", "product_id": "nginx-1.14.2-3.3.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "vim-plugin-nginx-1.14.2-3.3.1.noarch", "product": { "name": "vim-plugin-nginx-1.14.2-3.3.1.noarch", "product_id": "vim-plugin-nginx-1.14.2-3.3.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "nginx-1.14.2-3.3.1.ppc64le", "product": { "name": "nginx-1.14.2-3.3.1.ppc64le", "product_id": "nginx-1.14.2-3.3.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "nginx-1.14.2-3.3.1.s390x", "product": { "name": "nginx-1.14.2-3.3.1.s390x", "product_id": "nginx-1.14.2-3.3.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "nginx-1.14.2-3.3.1.x86_64", "product": { "name": "nginx-1.14.2-3.3.1.x86_64", "product_id": "nginx-1.14.2-3.3.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Server Applications 15", "product": { "name": "SUSE Linux Enterprise Module for Server Applications 15", "product_id": "SUSE Linux Enterprise Module for Server Applications 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-server-applications:15" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "nginx-1.14.2-3.3.1.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15", "product_id": "SUSE Linux Enterprise Module for Server Applications 15:nginx-1.14.2-3.3.1.aarch64" }, "product_reference": "nginx-1.14.2-3.3.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "nginx-1.14.2-3.3.1.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15", "product_id": "SUSE Linux Enterprise Module for Server Applications 15:nginx-1.14.2-3.3.1.ppc64le" }, "product_reference": "nginx-1.14.2-3.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "nginx-1.14.2-3.3.1.s390x as component of SUSE Linux Enterprise Module for Server Applications 15", "product_id": "SUSE Linux Enterprise Module for Server Applications 15:nginx-1.14.2-3.3.1.s390x" }, "product_reference": "nginx-1.14.2-3.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "nginx-1.14.2-3.3.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15", "product_id": "SUSE Linux Enterprise Module for Server Applications 15:nginx-1.14.2-3.3.1.x86_64" }, "product_reference": "nginx-1.14.2-3.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-16843", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16843" } ], "notes": [ { "category": "general", "text": "nginx before versions 1.15.6 and 1.14.1 has a vulnerability in the implementation of HTTP/2 that can allow for excessive memory consumption. This issue affects nginx compiled with the ngx_http_v2_module (not compiled by default) if the \u0027http2\u0027 option of the \u0027listen\u0027 directive is used in a configuration file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Server Applications 15:nginx-1.14.2-3.3.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:nginx-1.14.2-3.3.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:nginx-1.14.2-3.3.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:nginx-1.14.2-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16843", "url": "https://www.suse.com/security/cve/CVE-2018-16843" }, { "category": "external", "summary": "SUSE Bug 1115022 for CVE-2018-16843", "url": "https://bugzilla.suse.com/1115022" }, { "category": "external", "summary": "SUSE Bug 1115025 for CVE-2018-16843", "url": "https://bugzilla.suse.com/1115025" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Server Applications 15:nginx-1.14.2-3.3.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:nginx-1.14.2-3.3.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:nginx-1.14.2-3.3.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:nginx-1.14.2-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Server Applications 15:nginx-1.14.2-3.3.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:nginx-1.14.2-3.3.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:nginx-1.14.2-3.3.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:nginx-1.14.2-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-02-12T12:58:43Z", "details": "moderate" } ], "title": "CVE-2018-16843" }, { "cve": "CVE-2018-16844", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16844" } ], "notes": [ { "category": "general", "text": "nginx before versions 1.15.6 and 1.14.1 has a vulnerability in the implementation of HTTP/2 that can allow for excessive CPU usage. This issue affects nginx compiled with the ngx_http_v2_module (not compiled by default) if the \u0027http2\u0027 option of the \u0027listen\u0027 directive is used in a configuration file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Server Applications 15:nginx-1.14.2-3.3.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:nginx-1.14.2-3.3.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:nginx-1.14.2-3.3.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:nginx-1.14.2-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16844", "url": "https://www.suse.com/security/cve/CVE-2018-16844" }, { "category": "external", "summary": "SUSE Bug 1115022 for CVE-2018-16844", "url": "https://bugzilla.suse.com/1115022" }, { "category": "external", "summary": "SUSE Bug 1115025 for CVE-2018-16844", "url": "https://bugzilla.suse.com/1115025" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Server Applications 15:nginx-1.14.2-3.3.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:nginx-1.14.2-3.3.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:nginx-1.14.2-3.3.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:nginx-1.14.2-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Server Applications 15:nginx-1.14.2-3.3.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:nginx-1.14.2-3.3.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:nginx-1.14.2-3.3.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:nginx-1.14.2-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-02-12T12:58:43Z", "details": "moderate" } ], "title": "CVE-2018-16844" }, { "cve": "CVE-2018-16845", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16845" } ], "notes": [ { "category": "general", "text": "nginx before versions 1.15.6, 1.14.1 has a vulnerability in the ngx_http_mp4_module, which might allow an attacker to cause infinite loop in a worker process, cause a worker process crash, or might result in worker process memory disclosure by using a specially crafted mp4 file. The issue only affects nginx if it is built with the ngx_http_mp4_module (the module is not built by default) and the .mp4. directive is used in the configuration file. Further, the attack is only possible if an attacker is able to trigger processing of a specially crafted mp4 file with the ngx_http_mp4_module.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Server Applications 15:nginx-1.14.2-3.3.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:nginx-1.14.2-3.3.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:nginx-1.14.2-3.3.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:nginx-1.14.2-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16845", "url": "https://www.suse.com/security/cve/CVE-2018-16845" }, { "category": "external", "summary": "SUSE Bug 1115015 for CVE-2018-16845", "url": "https://bugzilla.suse.com/1115015" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Server Applications 15:nginx-1.14.2-3.3.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:nginx-1.14.2-3.3.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:nginx-1.14.2-3.3.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:nginx-1.14.2-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Server Applications 15:nginx-1.14.2-3.3.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:nginx-1.14.2-3.3.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:nginx-1.14.2-3.3.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:nginx-1.14.2-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-02-12T12:58:43Z", "details": "important" } ], "title": "CVE-2018-16845" } ] }
suse-su-2019:2309-1
Vulnerability from csaf_suse
Published
2019-09-05 14:00
Modified
2019-09-05 14:00
Summary
Security update for nginx
Notes
Title of the patch
Security update for nginx
Description of the patch
This update for nginx fixes the following issues:
Security issues fixed:
- CVE-2019-9511: Fixed a denial of service by manipulating the window size and stream prioritization (bsc#1145579).
- CVE-2019-9513: Fixed a denial of service caused by resource loops (bsc#1145580).
- CVE-2019-9516: Fixed a denial of service caused by header leaks (bsc#1145582).
- CVE-2018-16845: Fixed denial of service and memory disclosure via mp4 module (bsc#1115015).
- CVE-2018-16843: Fixed excessive memory consumption in HTTP/2 implementation (bsc#1115022).
- CVE-2018-16844: Fixed excessive CPU usage via flaw in HTTP/2 implementation (bsc#1115025).
Patchnames
SUSE-2019-2309,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2309,SUSE-SLE-Module-Server-Applications-15-SP1-2019-2309
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for nginx", "title": "Title of the patch" }, { "category": "description", "text": "This update for nginx fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2019-9511: Fixed a denial of service by manipulating the window size and stream prioritization (bsc#1145579).\n- CVE-2019-9513: Fixed a denial of service caused by resource loops (bsc#1145580).\n- CVE-2019-9516: Fixed a denial of service caused by header leaks (bsc#1145582).\n- CVE-2018-16845: Fixed denial of service and memory disclosure via mp4 module (bsc#1115015).\n- CVE-2018-16843: Fixed excessive memory consumption in HTTP/2 implementation (bsc#1115022).\n- CVE-2018-16844: Fixed excessive CPU usage via flaw in HTTP/2 implementation (bsc#1115025).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2019-2309,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2309,SUSE-SLE-Module-Server-Applications-15-SP1-2019-2309", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_2309-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:2309-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192309-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:2309-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2019-September/005885.html" }, { "category": "self", "summary": "SUSE Bug 1115015", "url": "https://bugzilla.suse.com/1115015" }, { "category": "self", "summary": "SUSE Bug 1115022", "url": "https://bugzilla.suse.com/1115022" }, { "category": "self", "summary": "SUSE Bug 1115025", "url": "https://bugzilla.suse.com/1115025" }, { "category": "self", "summary": "SUSE Bug 1145579", "url": "https://bugzilla.suse.com/1145579" }, { "category": "self", "summary": "SUSE Bug 1145580", "url": "https://bugzilla.suse.com/1145580" }, { "category": "self", "summary": "SUSE Bug 1145582", "url": "https://bugzilla.suse.com/1145582" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16843 page", "url": "https://www.suse.com/security/cve/CVE-2018-16843/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16844 page", "url": "https://www.suse.com/security/cve/CVE-2018-16844/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16845 page", "url": "https://www.suse.com/security/cve/CVE-2018-16845/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9511 page", "url": "https://www.suse.com/security/cve/CVE-2019-9511/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9513 page", "url": "https://www.suse.com/security/cve/CVE-2019-9513/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9516 page", "url": "https://www.suse.com/security/cve/CVE-2019-9516/" } ], "title": "Security update for nginx", "tracking": { "current_release_date": "2019-09-05T14:00:22Z", "generator": { "date": "2019-09-05T14:00:22Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:2309-1", "initial_release_date": "2019-09-05T14:00:22Z", "revision_history": [ { "date": "2019-09-05T14:00:22Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "nginx-1.14.2-6.3.1.aarch64", "product": { "name": "nginx-1.14.2-6.3.1.aarch64", "product_id": "nginx-1.14.2-6.3.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "nginx-1.14.2-6.3.1.i586", "product": { "name": "nginx-1.14.2-6.3.1.i586", "product_id": "nginx-1.14.2-6.3.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "nginx-source-1.14.2-6.3.1.noarch", "product": { "name": "nginx-source-1.14.2-6.3.1.noarch", "product_id": "nginx-source-1.14.2-6.3.1.noarch" } }, { "category": "product_version", "name": "vim-plugin-nginx-1.14.2-6.3.1.noarch", "product": { "name": "vim-plugin-nginx-1.14.2-6.3.1.noarch", "product_id": "vim-plugin-nginx-1.14.2-6.3.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "nginx-1.14.2-6.3.1.ppc64le", "product": { "name": "nginx-1.14.2-6.3.1.ppc64le", "product_id": "nginx-1.14.2-6.3.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "nginx-1.14.2-6.3.1.s390x", "product": { "name": "nginx-1.14.2-6.3.1.s390x", "product_id": "nginx-1.14.2-6.3.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "nginx-1.14.2-6.3.1.x86_64", "product": { "name": "nginx-1.14.2-6.3.1.x86_64", "product_id": "nginx-1.14.2-6.3.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Server Applications 15 SP1", "product": { "name": "SUSE Linux Enterprise Module for Server Applications 15 SP1", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-server-applications:15:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "nginx-1.14.2-6.3.1.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP1", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP1:nginx-1.14.2-6.3.1.aarch64" }, "product_reference": "nginx-1.14.2-6.3.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "nginx-1.14.2-6.3.1.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15 SP1", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP1:nginx-1.14.2-6.3.1.ppc64le" }, "product_reference": "nginx-1.14.2-6.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "nginx-1.14.2-6.3.1.s390x as component of SUSE Linux Enterprise Module for Server Applications 15 SP1", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP1:nginx-1.14.2-6.3.1.s390x" }, "product_reference": "nginx-1.14.2-6.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "nginx-1.14.2-6.3.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP1", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP1:nginx-1.14.2-6.3.1.x86_64" }, "product_reference": "nginx-1.14.2-6.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "nginx-source-1.14.2-6.3.1.noarch as component of SUSE Linux Enterprise Module for Server Applications 15 SP1", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP1:nginx-source-1.14.2-6.3.1.noarch" }, "product_reference": "nginx-source-1.14.2-6.3.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP1" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-16843", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16843" } ], "notes": [ { "category": "general", "text": "nginx before versions 1.15.6 and 1.14.1 has a vulnerability in the implementation of HTTP/2 that can allow for excessive memory consumption. This issue affects nginx compiled with the ngx_http_v2_module (not compiled by default) if the \u0027http2\u0027 option of the \u0027listen\u0027 directive is used in a configuration file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Server Applications 15 SP1:nginx-1.14.2-6.3.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:nginx-1.14.2-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:nginx-1.14.2-6.3.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:nginx-1.14.2-6.3.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:nginx-source-1.14.2-6.3.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16843", "url": "https://www.suse.com/security/cve/CVE-2018-16843" }, { "category": "external", "summary": "SUSE Bug 1115022 for CVE-2018-16843", "url": "https://bugzilla.suse.com/1115022" }, { "category": "external", "summary": "SUSE Bug 1115025 for CVE-2018-16843", "url": "https://bugzilla.suse.com/1115025" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Server Applications 15 SP1:nginx-1.14.2-6.3.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:nginx-1.14.2-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:nginx-1.14.2-6.3.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:nginx-1.14.2-6.3.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:nginx-source-1.14.2-6.3.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Server Applications 15 SP1:nginx-1.14.2-6.3.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:nginx-1.14.2-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:nginx-1.14.2-6.3.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:nginx-1.14.2-6.3.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:nginx-source-1.14.2-6.3.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2019-09-05T14:00:22Z", "details": "moderate" } ], "title": "CVE-2018-16843" }, { "cve": "CVE-2018-16844", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16844" } ], "notes": [ { "category": "general", "text": "nginx before versions 1.15.6 and 1.14.1 has a vulnerability in the implementation of HTTP/2 that can allow for excessive CPU usage. This issue affects nginx compiled with the ngx_http_v2_module (not compiled by default) if the \u0027http2\u0027 option of the \u0027listen\u0027 directive is used in a configuration file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Server Applications 15 SP1:nginx-1.14.2-6.3.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:nginx-1.14.2-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:nginx-1.14.2-6.3.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:nginx-1.14.2-6.3.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:nginx-source-1.14.2-6.3.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16844", "url": "https://www.suse.com/security/cve/CVE-2018-16844" }, { "category": "external", "summary": "SUSE Bug 1115022 for CVE-2018-16844", "url": "https://bugzilla.suse.com/1115022" }, { "category": "external", "summary": "SUSE Bug 1115025 for CVE-2018-16844", "url": "https://bugzilla.suse.com/1115025" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Server Applications 15 SP1:nginx-1.14.2-6.3.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:nginx-1.14.2-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:nginx-1.14.2-6.3.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:nginx-1.14.2-6.3.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:nginx-source-1.14.2-6.3.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Server Applications 15 SP1:nginx-1.14.2-6.3.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:nginx-1.14.2-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:nginx-1.14.2-6.3.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:nginx-1.14.2-6.3.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:nginx-source-1.14.2-6.3.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2019-09-05T14:00:22Z", "details": "moderate" } ], "title": "CVE-2018-16844" }, { "cve": "CVE-2018-16845", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16845" } ], "notes": [ { "category": "general", "text": "nginx before versions 1.15.6, 1.14.1 has a vulnerability in the ngx_http_mp4_module, which might allow an attacker to cause infinite loop in a worker process, cause a worker process crash, or might result in worker process memory disclosure by using a specially crafted mp4 file. The issue only affects nginx if it is built with the ngx_http_mp4_module (the module is not built by default) and the .mp4. directive is used in the configuration file. Further, the attack is only possible if an attacker is able to trigger processing of a specially crafted mp4 file with the ngx_http_mp4_module.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Server Applications 15 SP1:nginx-1.14.2-6.3.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:nginx-1.14.2-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:nginx-1.14.2-6.3.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:nginx-1.14.2-6.3.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:nginx-source-1.14.2-6.3.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16845", "url": "https://www.suse.com/security/cve/CVE-2018-16845" }, { "category": "external", "summary": "SUSE Bug 1115015 for CVE-2018-16845", "url": "https://bugzilla.suse.com/1115015" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Server Applications 15 SP1:nginx-1.14.2-6.3.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:nginx-1.14.2-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:nginx-1.14.2-6.3.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:nginx-1.14.2-6.3.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:nginx-source-1.14.2-6.3.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Server Applications 15 SP1:nginx-1.14.2-6.3.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:nginx-1.14.2-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:nginx-1.14.2-6.3.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:nginx-1.14.2-6.3.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:nginx-source-1.14.2-6.3.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2019-09-05T14:00:22Z", "details": "important" } ], "title": "CVE-2018-16845" }, { "cve": "CVE-2019-9511", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9511" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Server Applications 15 SP1:nginx-1.14.2-6.3.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:nginx-1.14.2-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:nginx-1.14.2-6.3.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:nginx-1.14.2-6.3.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:nginx-source-1.14.2-6.3.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9511", "url": "https://www.suse.com/security/cve/CVE-2019-9511" }, { "category": "external", "summary": "SUSE Bug 1145579 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1145579" }, { "category": "external", "summary": "SUSE Bug 1146091 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1146091" }, { "category": "external", "summary": "SUSE Bug 1146182 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1146182" }, { "category": "external", "summary": "SUSE Bug 1193427 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1193427" }, { "category": "external", "summary": "SUSE Bug 1202787 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1202787" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Server Applications 15 SP1:nginx-1.14.2-6.3.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:nginx-1.14.2-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:nginx-1.14.2-6.3.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:nginx-1.14.2-6.3.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:nginx-source-1.14.2-6.3.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Server Applications 15 SP1:nginx-1.14.2-6.3.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:nginx-1.14.2-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:nginx-1.14.2-6.3.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:nginx-1.14.2-6.3.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:nginx-source-1.14.2-6.3.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2019-09-05T14:00:22Z", "details": "low" } ], "title": "CVE-2019-9511" }, { "cve": "CVE-2019-9513", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9513" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Server Applications 15 SP1:nginx-1.14.2-6.3.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:nginx-1.14.2-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:nginx-1.14.2-6.3.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:nginx-1.14.2-6.3.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:nginx-source-1.14.2-6.3.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9513", "url": "https://www.suse.com/security/cve/CVE-2019-9513" }, { "category": "external", "summary": "SUSE Bug 1145580 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1145580" }, { "category": "external", "summary": "SUSE Bug 1146094 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1146094" }, { "category": "external", "summary": "SUSE Bug 1146184 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1146184" }, { "category": "external", "summary": "SUSE Bug 1193427 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1193427" }, { "category": "external", "summary": "SUSE Bug 1202787 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1202787" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Server Applications 15 SP1:nginx-1.14.2-6.3.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:nginx-1.14.2-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:nginx-1.14.2-6.3.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:nginx-1.14.2-6.3.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:nginx-source-1.14.2-6.3.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Server Applications 15 SP1:nginx-1.14.2-6.3.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:nginx-1.14.2-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:nginx-1.14.2-6.3.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:nginx-1.14.2-6.3.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:nginx-source-1.14.2-6.3.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2019-09-05T14:00:22Z", "details": "low" } ], "title": "CVE-2019-9513" }, { "cve": "CVE-2019-9516", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9516" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service. The attacker sends a stream of headers with a 0-length header name and 0-length header value, optionally Huffman encoded into 1-byte or greater headers. Some implementations allocate memory for these headers and keep the allocation alive until the session dies. This can consume excess memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Server Applications 15 SP1:nginx-1.14.2-6.3.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:nginx-1.14.2-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:nginx-1.14.2-6.3.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:nginx-1.14.2-6.3.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:nginx-source-1.14.2-6.3.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9516", "url": "https://www.suse.com/security/cve/CVE-2019-9516" }, { "category": "external", "summary": "SUSE Bug 1145582 for CVE-2019-9516", "url": "https://bugzilla.suse.com/1145582" }, { "category": "external", "summary": "SUSE Bug 1146090 for CVE-2019-9516", "url": "https://bugzilla.suse.com/1146090" }, { "category": "external", "summary": "SUSE Bug 1193427 for CVE-2019-9516", "url": "https://bugzilla.suse.com/1193427" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Server Applications 15 SP1:nginx-1.14.2-6.3.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:nginx-1.14.2-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:nginx-1.14.2-6.3.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:nginx-1.14.2-6.3.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:nginx-source-1.14.2-6.3.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Server Applications 15 SP1:nginx-1.14.2-6.3.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:nginx-1.14.2-6.3.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:nginx-1.14.2-6.3.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:nginx-1.14.2-6.3.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:nginx-source-1.14.2-6.3.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2019-09-05T14:00:22Z", "details": "low" } ], "title": "CVE-2019-9516" } ] }
ghsa-vq5f-vpgw-9vcp
Vulnerability from github
Published
2022-05-13 01:03
Modified
2022-05-13 01:03
Severity ?
VLAI Severity ?
Details
nginx before versions 1.15.6, 1.14.1 has a vulnerability in the ngx_http_mp4_module, which might allow an attacker to cause infinite loop in a worker process, cause a worker process crash, or might result in worker process memory disclosure by using a specially crafted mp4 file. The issue only affects nginx if it is built with the ngx_http_mp4_module (the module is not built by default) and the .mp4. directive is used in the configuration file. Further, the attack is only possible if an attacker is able to trigger processing of a specially crafted mp4 file with the ngx_http_mp4_module.
{ "affected": [], "aliases": [ "CVE-2018-16845" ], "database_specific": { "cwe_ids": [ "CWE-400" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2018-11-07T14:29:00Z", "severity": "MODERATE" }, "details": "nginx before versions 1.15.6, 1.14.1 has a vulnerability in the ngx_http_mp4_module, which might allow an attacker to cause infinite loop in a worker process, cause a worker process crash, or might result in worker process memory disclosure by using a specially crafted mp4 file. The issue only affects nginx if it is built with the ngx_http_mp4_module (the module is not built by default) and the .mp4. directive is used in the configuration file. Further, the attack is only possible if an attacker is able to trigger processing of a specially crafted mp4 file with the ngx_http_mp4_module.", "id": "GHSA-vq5f-vpgw-9vcp", "modified": "2022-05-13T01:03:32Z", "published": "2022-05-13T01:03:32Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-16845" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:3652" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:3653" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:3680" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:3681" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16845" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00010.html" }, { "type": "WEB", "url": "https://support.apple.com/kb/HT212818" }, { "type": "WEB", "url": "https://usn.ubuntu.com/3812-1" }, { "type": "WEB", "url": "https://www.debian.org/security/2018/dsa-4335" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00035.html" }, { "type": "WEB", "url": "http://mailman.nginx.org/pipermail/nginx-announce/2018/000221.html" }, { "type": "WEB", "url": "http://seclists.org/fulldisclosure/2021/Sep/36" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/105868" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1042039" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H", "type": "CVSS_V3" } ] }
rhsa-2018:3652
Vulnerability from csaf_redhat
Published
2018-11-26 12:08
Modified
2025-08-02 08:11
Summary
Red Hat Security Advisory: rh-nginx18-nginx security update
Notes
Topic
An update for rh-nginx18-nginx is now available for Red Hat Software Collections.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
nginx is a web and proxy server supporting HTTP and other protocols, with a focus on high concurrency, performance, and low memory usage.
Security Fix(es):
* nginx: Denial of service and memory disclosure via mp4 module (CVE-2018-16845)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Red Hat would like to thank the Nginx project for reporting this issue.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for rh-nginx18-nginx is now available for Red Hat Software Collections.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "nginx is a web and proxy server supporting HTTP and other protocols, with a focus on high concurrency, performance, and low memory usage.\n\nSecurity Fix(es):\n\n* nginx: Denial of service and memory disclosure via mp4 module (CVE-2018-16845)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank the Nginx project for reporting this issue.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:3652", "url": "https://access.redhat.com/errata/RHSA-2018:3652" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1644508", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1644508" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_3652.json" } ], "title": "Red Hat Security Advisory: rh-nginx18-nginx security update", "tracking": { "current_release_date": "2025-08-02T08:11:12+00:00", "generator": { "date": "2025-08-02T08:11:12+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2018:3652", "initial_release_date": "2018-11-26T12:08:06+00:00", "revision_history": [ { "date": "2018-11-26T12:08:06+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-11-26T12:08:06+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T08:11:12+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-3.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el6" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-3.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el6" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-RHSCL-3.2-7.4.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.2-7.5.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.2-7.6.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } } ], "category": "product_family", "name": "Red Hat Software Collections" }, { "branches": [ { "category": "product_version", "name": "rh-nginx18-nginx-1:1.8.1-1.el7.1.x86_64", "product": { "name": "rh-nginx18-nginx-1:1.8.1-1.el7.1.x86_64", "product_id": "rh-nginx18-nginx-1:1.8.1-1.el7.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx18-nginx@1.8.1-1.el7.1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.1.x86_64", "product": { "name": "rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.1.x86_64", "product_id": "rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx18-nginx-debuginfo@1.8.1-1.el7.1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.1.x86_64", "product": { "name": "rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.1.x86_64", "product_id": "rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx18-nginx-debuginfo@1.8.1-1.el6.1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "rh-nginx18-nginx-1:1.8.1-1.el6.1.x86_64", "product": { "name": "rh-nginx18-nginx-1:1.8.1-1.el6.1.x86_64", "product_id": "rh-nginx18-nginx-1:1.8.1-1.el6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx18-nginx@1.8.1-1.el6.1?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "rh-nginx18-nginx-1:1.8.1-1.el7.1.src", "product": { "name": "rh-nginx18-nginx-1:1.8.1-1.el7.1.src", "product_id": "rh-nginx18-nginx-1:1.8.1-1.el7.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx18-nginx@1.8.1-1.el7.1?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "rh-nginx18-nginx-1:1.8.1-1.el6.1.src", "product": { "name": "rh-nginx18-nginx-1:1.8.1-1.el6.1.src", "product_id": "rh-nginx18-nginx-1:1.8.1-1.el6.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx18-nginx@1.8.1-1.el6.1?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rh-nginx18-nginx-1:1.8.1-1.el6.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-3.2:rh-nginx18-nginx-1:1.8.1-1.el6.1.src" }, "product_reference": "rh-nginx18-nginx-1:1.8.1-1.el6.1.src", "relates_to_product_reference": "6Server-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx18-nginx-1:1.8.1-1.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-3.2:rh-nginx18-nginx-1:1.8.1-1.el6.1.x86_64" }, "product_reference": "rh-nginx18-nginx-1:1.8.1-1.el6.1.x86_64", "relates_to_product_reference": "6Server-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-3.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.1.x86_64" }, "product_reference": "rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.1.x86_64", "relates_to_product_reference": "6Server-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx18-nginx-1:1.8.1-1.el6.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-3.2:rh-nginx18-nginx-1:1.8.1-1.el6.1.src" }, "product_reference": "rh-nginx18-nginx-1:1.8.1-1.el6.1.src", "relates_to_product_reference": "6Workstation-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx18-nginx-1:1.8.1-1.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-3.2:rh-nginx18-nginx-1:1.8.1-1.el6.1.x86_64" }, "product_reference": "rh-nginx18-nginx-1:1.8.1-1.el6.1.x86_64", "relates_to_product_reference": "6Workstation-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-3.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.1.x86_64" }, "product_reference": "rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.1.x86_64", "relates_to_product_reference": "6Workstation-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx18-nginx-1:1.8.1-1.el7.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-RHSCL-3.2-7.4.Z:rh-nginx18-nginx-1:1.8.1-1.el7.1.src" }, "product_reference": "rh-nginx18-nginx-1:1.8.1-1.el7.1.src", "relates_to_product_reference": "7Server-RHSCL-3.2-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx18-nginx-1:1.8.1-1.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-RHSCL-3.2-7.4.Z:rh-nginx18-nginx-1:1.8.1-1.el7.1.x86_64" }, "product_reference": "rh-nginx18-nginx-1:1.8.1-1.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.2-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-RHSCL-3.2-7.4.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.1.x86_64" }, "product_reference": "rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.2-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx18-nginx-1:1.8.1-1.el7.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.2-7.5.Z:rh-nginx18-nginx-1:1.8.1-1.el7.1.src" }, "product_reference": "rh-nginx18-nginx-1:1.8.1-1.el7.1.src", "relates_to_product_reference": "7Server-RHSCL-3.2-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx18-nginx-1:1.8.1-1.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.2-7.5.Z:rh-nginx18-nginx-1:1.8.1-1.el7.1.x86_64" }, "product_reference": "rh-nginx18-nginx-1:1.8.1-1.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.2-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.2-7.5.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.1.x86_64" }, "product_reference": "rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.2-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx18-nginx-1:1.8.1-1.el7.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.2-7.6.Z:rh-nginx18-nginx-1:1.8.1-1.el7.1.src" }, "product_reference": "rh-nginx18-nginx-1:1.8.1-1.el7.1.src", "relates_to_product_reference": "7Server-RHSCL-3.2-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx18-nginx-1:1.8.1-1.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.2-7.6.Z:rh-nginx18-nginx-1:1.8.1-1.el7.1.x86_64" }, "product_reference": "rh-nginx18-nginx-1:1.8.1-1.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.2-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.2-7.6.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.1.x86_64" }, "product_reference": "rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.2-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx18-nginx-1:1.8.1-1.el7.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.2:rh-nginx18-nginx-1:1.8.1-1.el7.1.src" }, "product_reference": "rh-nginx18-nginx-1:1.8.1-1.el7.1.src", "relates_to_product_reference": "7Server-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx18-nginx-1:1.8.1-1.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.2:rh-nginx18-nginx-1:1.8.1-1.el7.1.x86_64" }, "product_reference": "rh-nginx18-nginx-1:1.8.1-1.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.1.x86_64" }, "product_reference": "rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx18-nginx-1:1.8.1-1.el7.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.2:rh-nginx18-nginx-1:1.8.1-1.el7.1.src" }, "product_reference": "rh-nginx18-nginx-1:1.8.1-1.el7.1.src", "relates_to_product_reference": "7Workstation-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx18-nginx-1:1.8.1-1.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.2:rh-nginx18-nginx-1:1.8.1-1.el7.1.x86_64" }, "product_reference": "rh-nginx18-nginx-1:1.8.1-1.el7.1.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.1.x86_64" }, "product_reference": "rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.1.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.2" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Nginx project" ] } ], "cve": "CVE-2018-16845", "cwe": { "id": "CWE-201", "name": "Insertion of Sensitive Information Into Sent Data" }, "discovery_date": "2018-10-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1644508" } ], "notes": [ { "category": "description", "text": "An instance of missing input sanitization was found in the mp4 module for nginx. A local attacker could create a specially crafted video file that, when streamed by the server, would cause a denial of service (server crash or hang) and, possibly, information disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "nginx: Denial of service and memory disclosure via mp4 module", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHSCL-3.2:rh-nginx18-nginx-1:1.8.1-1.el6.1.src", "6Server-RHSCL-3.2:rh-nginx18-nginx-1:1.8.1-1.el6.1.x86_64", "6Server-RHSCL-3.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.1.x86_64", "6Workstation-RHSCL-3.2:rh-nginx18-nginx-1:1.8.1-1.el6.1.src", "6Workstation-RHSCL-3.2:rh-nginx18-nginx-1:1.8.1-1.el6.1.x86_64", "6Workstation-RHSCL-3.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx18-nginx-1:1.8.1-1.el7.1.src", "7Server-RHSCL-3.2-7.4.Z:rh-nginx18-nginx-1:1.8.1-1.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx18-nginx-1:1.8.1-1.el7.1.src", "7Server-RHSCL-3.2-7.5.Z:rh-nginx18-nginx-1:1.8.1-1.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx18-nginx-1:1.8.1-1.el7.1.src", "7Server-RHSCL-3.2-7.6.Z:rh-nginx18-nginx-1:1.8.1-1.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx18-nginx-1:1.8.1-1.el7.1.src", "7Server-RHSCL-3.2:rh-nginx18-nginx-1:1.8.1-1.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx18-nginx-1:1.8.1-1.el7.1.src", "7Workstation-RHSCL-3.2:rh-nginx18-nginx-1:1.8.1-1.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-16845" }, { "category": "external", "summary": "RHBZ#1644508", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1644508" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-16845", "url": "https://www.cve.org/CVERecord?id=CVE-2018-16845" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-16845", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-16845" }, { "category": "external", "summary": "http://mailman.nginx.org/pipermail/nginx-announce/2018/000221.html", "url": "http://mailman.nginx.org/pipermail/nginx-announce/2018/000221.html" } ], "release_date": "2018-11-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-11-26T12:08:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe rh-nginx18-nginx service must be restarted for this update to take effect.", "product_ids": [ "6Server-RHSCL-3.2:rh-nginx18-nginx-1:1.8.1-1.el6.1.src", "6Server-RHSCL-3.2:rh-nginx18-nginx-1:1.8.1-1.el6.1.x86_64", "6Server-RHSCL-3.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.1.x86_64", "6Workstation-RHSCL-3.2:rh-nginx18-nginx-1:1.8.1-1.el6.1.src", "6Workstation-RHSCL-3.2:rh-nginx18-nginx-1:1.8.1-1.el6.1.x86_64", "6Workstation-RHSCL-3.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx18-nginx-1:1.8.1-1.el7.1.src", "7Server-RHSCL-3.2-7.4.Z:rh-nginx18-nginx-1:1.8.1-1.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx18-nginx-1:1.8.1-1.el7.1.src", "7Server-RHSCL-3.2-7.5.Z:rh-nginx18-nginx-1:1.8.1-1.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx18-nginx-1:1.8.1-1.el7.1.src", "7Server-RHSCL-3.2-7.6.Z:rh-nginx18-nginx-1:1.8.1-1.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx18-nginx-1:1.8.1-1.el7.1.src", "7Server-RHSCL-3.2:rh-nginx18-nginx-1:1.8.1-1.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx18-nginx-1:1.8.1-1.el7.1.src", "7Workstation-RHSCL-3.2:rh-nginx18-nginx-1:1.8.1-1.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:3652" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.0" }, "products": [ "6Server-RHSCL-3.2:rh-nginx18-nginx-1:1.8.1-1.el6.1.src", "6Server-RHSCL-3.2:rh-nginx18-nginx-1:1.8.1-1.el6.1.x86_64", "6Server-RHSCL-3.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.1.x86_64", "6Workstation-RHSCL-3.2:rh-nginx18-nginx-1:1.8.1-1.el6.1.src", "6Workstation-RHSCL-3.2:rh-nginx18-nginx-1:1.8.1-1.el6.1.x86_64", "6Workstation-RHSCL-3.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx18-nginx-1:1.8.1-1.el7.1.src", "7Server-RHSCL-3.2-7.4.Z:rh-nginx18-nginx-1:1.8.1-1.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx18-nginx-1:1.8.1-1.el7.1.src", "7Server-RHSCL-3.2-7.5.Z:rh-nginx18-nginx-1:1.8.1-1.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx18-nginx-1:1.8.1-1.el7.1.src", "7Server-RHSCL-3.2-7.6.Z:rh-nginx18-nginx-1:1.8.1-1.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx18-nginx-1:1.8.1-1.el7.1.src", "7Server-RHSCL-3.2:rh-nginx18-nginx-1:1.8.1-1.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx18-nginx-1:1.8.1-1.el7.1.src", "7Workstation-RHSCL-3.2:rh-nginx18-nginx-1:1.8.1-1.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "nginx: Denial of service and memory disclosure via mp4 module" } ] }
rhsa-2018:3680
Vulnerability from csaf_redhat
Published
2018-11-27 09:04
Modified
2025-08-03 22:20
Summary
Red Hat Security Advisory: rh-nginx112-nginx security update
Notes
Topic
An update for rh-nginx112-nginx is now available for Red Hat Software Collections.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
nginx is a web and proxy server supporting HTTP and other protocols, with a focus on high concurrency, performance, and low memory usage.
Security Fix(es):
* nginx: Denial of service and memory disclosure via mp4 module (CVE-2018-16845)
* nginx: Excessive memory consumption via flaw in HTTP/2 implementation (CVE-2018-16843)
* nginx: Excessive CPU usage via flaw in HTTP/2 implementation (CVE-2018-16844)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Red Hat would like to thank the Nginx project for reporting these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for rh-nginx112-nginx is now available for Red Hat Software Collections.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "nginx is a web and proxy server supporting HTTP and other protocols, with a focus on high concurrency, performance, and low memory usage.\n\nSecurity Fix(es):\n\n* nginx: Denial of service and memory disclosure via mp4 module (CVE-2018-16845)\n\n* nginx: Excessive memory consumption via flaw in HTTP/2 implementation (CVE-2018-16843)\n\n* nginx: Excessive CPU usage via flaw in HTTP/2 implementation (CVE-2018-16844)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank the Nginx project for reporting these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:3680", "url": "https://access.redhat.com/errata/RHSA-2018:3680" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1644508", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1644508" }, { "category": "external", "summary": "1644510", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1644510" }, { "category": "external", "summary": "1644511", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1644511" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_3680.json" } ], "title": "Red Hat Security Advisory: rh-nginx112-nginx security update", "tracking": { "current_release_date": "2025-08-03T22:20:33+00:00", "generator": { "date": "2025-08-03T22:20:33+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2018:3680", "initial_release_date": "2018-11-27T09:04:25+00:00", "revision_history": [ { "date": "2018-11-27T09:04:25+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-11-27T09:04:25+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-03T22:20:33+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-RHSCL-3.2-7.4.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.2-7.5.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.2-7.6.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } } ], "category": "product_family", "name": "Red Hat Software Collections" }, { "branches": [ { "category": "product_version", "name": "rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.aarch64", "product": { "name": "rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.aarch64", "product_id": "rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx112-nginx-mod-http-xslt-filter@1.12.1-2.el7.1?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.aarch64", "product": { "name": "rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.aarch64", "product_id": "rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx112-nginx-mod-stream@1.12.1-2.el7.1?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.aarch64", "product": { "name": "rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.aarch64", "product_id": "rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx112-nginx-mod-http-image-filter@1.12.1-2.el7.1?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "rh-nginx112-nginx-1:1.12.1-2.el7.1.aarch64", "product": { "name": "rh-nginx112-nginx-1:1.12.1-2.el7.1.aarch64", "product_id": "rh-nginx112-nginx-1:1.12.1-2.el7.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx112-nginx@1.12.1-2.el7.1?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.aarch64", "product": { "name": "rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.aarch64", "product_id": "rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx112-nginx-mod-mail@1.12.1-2.el7.1?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.aarch64", "product": { "name": "rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.aarch64", "product_id": "rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx112-nginx-debuginfo@1.12.1-2.el7.1?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.s390x", "product": { "name": "rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.s390x", "product_id": "rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx112-nginx-mod-http-xslt-filter@1.12.1-2.el7.1?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.s390x", "product": { "name": "rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.s390x", "product_id": "rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx112-nginx-mod-stream@1.12.1-2.el7.1?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.s390x", "product": { "name": "rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.s390x", "product_id": "rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx112-nginx-mod-http-image-filter@1.12.1-2.el7.1?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "rh-nginx112-nginx-1:1.12.1-2.el7.1.s390x", "product": { "name": "rh-nginx112-nginx-1:1.12.1-2.el7.1.s390x", "product_id": "rh-nginx112-nginx-1:1.12.1-2.el7.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx112-nginx@1.12.1-2.el7.1?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.s390x", "product": { "name": "rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.s390x", "product_id": "rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx112-nginx-mod-mail@1.12.1-2.el7.1?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.s390x", "product": { "name": "rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.s390x", "product_id": "rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx112-nginx-debuginfo@1.12.1-2.el7.1?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.ppc64le", "product": { "name": "rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.ppc64le", "product_id": "rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx112-nginx-mod-http-xslt-filter@1.12.1-2.el7.1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.ppc64le", "product": { "name": "rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.ppc64le", "product_id": "rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx112-nginx-mod-stream@1.12.1-2.el7.1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.ppc64le", "product": { "name": "rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.ppc64le", "product_id": "rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx112-nginx-mod-http-image-filter@1.12.1-2.el7.1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "rh-nginx112-nginx-1:1.12.1-2.el7.1.ppc64le", "product": { "name": "rh-nginx112-nginx-1:1.12.1-2.el7.1.ppc64le", "product_id": "rh-nginx112-nginx-1:1.12.1-2.el7.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx112-nginx@1.12.1-2.el7.1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.ppc64le", "product": { "name": "rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.ppc64le", "product_id": "rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx112-nginx-mod-mail@1.12.1-2.el7.1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.ppc64le", "product": { "name": "rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.ppc64le", "product_id": "rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx112-nginx-debuginfo@1.12.1-2.el7.1?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "rh-nginx112-nginx-1:1.12.1-2.el7.1.src", "product": { "name": "rh-nginx112-nginx-1:1.12.1-2.el7.1.src", "product_id": "rh-nginx112-nginx-1:1.12.1-2.el7.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx112-nginx@1.12.1-2.el7.1?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.x86_64", "product": { "name": "rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.x86_64", "product_id": "rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx112-nginx-mod-http-xslt-filter@1.12.1-2.el7.1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.x86_64", "product": { "name": "rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.x86_64", "product_id": "rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx112-nginx-mod-stream@1.12.1-2.el7.1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.x86_64", "product": { "name": "rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.x86_64", "product_id": "rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx112-nginx-mod-http-image-filter@1.12.1-2.el7.1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "rh-nginx112-nginx-1:1.12.1-2.el7.1.x86_64", "product": { "name": "rh-nginx112-nginx-1:1.12.1-2.el7.1.x86_64", "product_id": "rh-nginx112-nginx-1:1.12.1-2.el7.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx112-nginx@1.12.1-2.el7.1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.x86_64", "product": { "name": "rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.x86_64", "product_id": "rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx112-nginx-mod-mail@1.12.1-2.el7.1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "rh-nginx112-nginx-mod-http-perl-1:1.12.1-2.el7.1.x86_64", "product": { "name": "rh-nginx112-nginx-mod-http-perl-1:1.12.1-2.el7.1.x86_64", "product_id": "rh-nginx112-nginx-mod-http-perl-1:1.12.1-2.el7.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx112-nginx-mod-http-perl@1.12.1-2.el7.1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.x86_64", "product": { "name": "rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.x86_64", "product_id": "rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx112-nginx-debuginfo@1.12.1-2.el7.1?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-1:1.12.1-2.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.aarch64" }, "product_reference": "rh-nginx112-nginx-1:1.12.1-2.el7.1.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-1:1.12.1-2.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.ppc64le" }, "product_reference": "rh-nginx112-nginx-1:1.12.1-2.el7.1.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-1:1.12.1-2.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.s390x" }, "product_reference": "rh-nginx112-nginx-1:1.12.1-2.el7.1.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-1:1.12.1-2.el7.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.src" }, "product_reference": "rh-nginx112-nginx-1:1.12.1-2.el7.1.src", "relates_to_product_reference": "7Server-Alt-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-1:1.12.1-2.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.x86_64" }, "product_reference": "rh-nginx112-nginx-1:1.12.1-2.el7.1.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.aarch64" }, "product_reference": "rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.ppc64le" }, "product_reference": "rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.s390x" }, "product_reference": "rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.x86_64" }, "product_reference": "rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.aarch64" }, "product_reference": "rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.ppc64le" }, "product_reference": "rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.s390x" }, "product_reference": "rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.x86_64" }, "product_reference": "rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-mod-http-perl-1:1.12.1-2.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-http-perl-1:1.12.1-2.el7.1.x86_64" }, "product_reference": "rh-nginx112-nginx-mod-http-perl-1:1.12.1-2.el7.1.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.aarch64" }, "product_reference": "rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.ppc64le" }, "product_reference": "rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.s390x" }, "product_reference": "rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.x86_64" }, "product_reference": "rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.aarch64" }, "product_reference": "rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.ppc64le" }, "product_reference": "rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.s390x" }, "product_reference": "rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.x86_64" }, "product_reference": "rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.aarch64" }, "product_reference": "rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.ppc64le" }, "product_reference": "rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.s390x" }, "product_reference": "rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.x86_64" }, "product_reference": "rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-1:1.12.1-2.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.ppc64le" }, "product_reference": "rh-nginx112-nginx-1:1.12.1-2.el7.1.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.2-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-1:1.12.1-2.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.s390x" }, "product_reference": "rh-nginx112-nginx-1:1.12.1-2.el7.1.s390x", "relates_to_product_reference": "7Server-RHSCL-3.2-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-1:1.12.1-2.el7.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.src" }, "product_reference": "rh-nginx112-nginx-1:1.12.1-2.el7.1.src", "relates_to_product_reference": "7Server-RHSCL-3.2-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-1:1.12.1-2.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.x86_64" }, "product_reference": "rh-nginx112-nginx-1:1.12.1-2.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.2-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.ppc64le" }, "product_reference": "rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.2-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.s390x" }, "product_reference": "rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.s390x", "relates_to_product_reference": "7Server-RHSCL-3.2-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.x86_64" }, "product_reference": "rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.2-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.ppc64le" }, "product_reference": "rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.2-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.s390x" }, "product_reference": "rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.s390x", "relates_to_product_reference": "7Server-RHSCL-3.2-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.x86_64" }, "product_reference": "rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.2-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-mod-http-perl-1:1.12.1-2.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-http-perl-1:1.12.1-2.el7.1.x86_64" }, "product_reference": "rh-nginx112-nginx-mod-http-perl-1:1.12.1-2.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.2-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.ppc64le" }, "product_reference": "rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.2-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.s390x" }, "product_reference": "rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.s390x", "relates_to_product_reference": "7Server-RHSCL-3.2-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.x86_64" }, "product_reference": "rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.2-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.ppc64le" }, "product_reference": "rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.2-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.s390x" }, "product_reference": "rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.s390x", "relates_to_product_reference": "7Server-RHSCL-3.2-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.x86_64" }, "product_reference": "rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.2-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.ppc64le" }, "product_reference": "rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.2-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.s390x" }, "product_reference": "rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.s390x", "relates_to_product_reference": "7Server-RHSCL-3.2-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.x86_64" }, "product_reference": "rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.2-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-1:1.12.1-2.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.ppc64le" }, "product_reference": "rh-nginx112-nginx-1:1.12.1-2.el7.1.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.2-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-1:1.12.1-2.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.s390x" }, "product_reference": "rh-nginx112-nginx-1:1.12.1-2.el7.1.s390x", "relates_to_product_reference": "7Server-RHSCL-3.2-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-1:1.12.1-2.el7.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.src" }, "product_reference": "rh-nginx112-nginx-1:1.12.1-2.el7.1.src", "relates_to_product_reference": "7Server-RHSCL-3.2-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-1:1.12.1-2.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.x86_64" }, "product_reference": "rh-nginx112-nginx-1:1.12.1-2.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.2-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.ppc64le" }, "product_reference": "rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.2-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.s390x" }, "product_reference": "rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.s390x", "relates_to_product_reference": "7Server-RHSCL-3.2-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.x86_64" }, "product_reference": "rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.2-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.ppc64le" }, "product_reference": "rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.2-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.s390x" }, "product_reference": "rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.s390x", "relates_to_product_reference": "7Server-RHSCL-3.2-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.x86_64" }, "product_reference": "rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.2-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-mod-http-perl-1:1.12.1-2.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-http-perl-1:1.12.1-2.el7.1.x86_64" }, "product_reference": "rh-nginx112-nginx-mod-http-perl-1:1.12.1-2.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.2-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.ppc64le" }, "product_reference": "rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.2-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.s390x" }, "product_reference": "rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.s390x", "relates_to_product_reference": "7Server-RHSCL-3.2-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.x86_64" }, "product_reference": "rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.2-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.ppc64le" }, "product_reference": "rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.2-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.s390x" }, "product_reference": "rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.s390x", "relates_to_product_reference": "7Server-RHSCL-3.2-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.x86_64" }, "product_reference": "rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.2-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.ppc64le" }, "product_reference": "rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.2-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.s390x" }, "product_reference": "rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.s390x", "relates_to_product_reference": "7Server-RHSCL-3.2-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.x86_64" }, "product_reference": "rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.2-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-1:1.12.1-2.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.ppc64le" }, "product_reference": "rh-nginx112-nginx-1:1.12.1-2.el7.1.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.2-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-1:1.12.1-2.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.s390x" }, "product_reference": "rh-nginx112-nginx-1:1.12.1-2.el7.1.s390x", "relates_to_product_reference": "7Server-RHSCL-3.2-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-1:1.12.1-2.el7.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.src" }, "product_reference": "rh-nginx112-nginx-1:1.12.1-2.el7.1.src", "relates_to_product_reference": "7Server-RHSCL-3.2-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-1:1.12.1-2.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.x86_64" }, "product_reference": "rh-nginx112-nginx-1:1.12.1-2.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.2-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.ppc64le" }, "product_reference": "rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.2-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.s390x" }, "product_reference": "rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.s390x", "relates_to_product_reference": "7Server-RHSCL-3.2-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.x86_64" }, "product_reference": "rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.2-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.ppc64le" }, "product_reference": "rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.2-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.s390x" }, "product_reference": "rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.s390x", "relates_to_product_reference": "7Server-RHSCL-3.2-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.x86_64" }, "product_reference": "rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.2-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-mod-http-perl-1:1.12.1-2.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-http-perl-1:1.12.1-2.el7.1.x86_64" }, "product_reference": "rh-nginx112-nginx-mod-http-perl-1:1.12.1-2.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.2-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.ppc64le" }, "product_reference": "rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.2-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.s390x" }, "product_reference": "rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.s390x", "relates_to_product_reference": "7Server-RHSCL-3.2-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.x86_64" }, "product_reference": "rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.2-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.ppc64le" }, "product_reference": "rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.2-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.s390x" }, "product_reference": "rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.s390x", "relates_to_product_reference": "7Server-RHSCL-3.2-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.x86_64" }, "product_reference": "rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.2-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.ppc64le" }, "product_reference": "rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.2-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.s390x" }, "product_reference": "rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.s390x", "relates_to_product_reference": "7Server-RHSCL-3.2-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.x86_64" }, "product_reference": "rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.2-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-1:1.12.1-2.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.aarch64" }, "product_reference": "rh-nginx112-nginx-1:1.12.1-2.el7.1.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-1:1.12.1-2.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.ppc64le" }, "product_reference": "rh-nginx112-nginx-1:1.12.1-2.el7.1.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-1:1.12.1-2.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.s390x" }, "product_reference": "rh-nginx112-nginx-1:1.12.1-2.el7.1.s390x", "relates_to_product_reference": "7Server-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-1:1.12.1-2.el7.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.src" }, "product_reference": "rh-nginx112-nginx-1:1.12.1-2.el7.1.src", "relates_to_product_reference": "7Server-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-1:1.12.1-2.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.x86_64" }, "product_reference": "rh-nginx112-nginx-1:1.12.1-2.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.aarch64" }, "product_reference": "rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.ppc64le" }, "product_reference": "rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.s390x" }, "product_reference": "rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.s390x", "relates_to_product_reference": "7Server-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.x86_64" }, "product_reference": "rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.aarch64" }, "product_reference": "rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.ppc64le" }, "product_reference": "rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.s390x" }, "product_reference": "rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.s390x", "relates_to_product_reference": "7Server-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.x86_64" }, "product_reference": "rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-mod-http-perl-1:1.12.1-2.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-http-perl-1:1.12.1-2.el7.1.x86_64" }, "product_reference": "rh-nginx112-nginx-mod-http-perl-1:1.12.1-2.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.aarch64" }, "product_reference": "rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.ppc64le" }, "product_reference": "rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.s390x" }, "product_reference": "rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.s390x", "relates_to_product_reference": "7Server-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.x86_64" }, "product_reference": "rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.aarch64" }, "product_reference": "rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.ppc64le" }, "product_reference": "rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.s390x" }, "product_reference": "rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.s390x", "relates_to_product_reference": "7Server-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.x86_64" }, "product_reference": "rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.aarch64" }, "product_reference": "rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.ppc64le" }, "product_reference": "rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.s390x" }, "product_reference": "rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.s390x", "relates_to_product_reference": "7Server-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.x86_64" }, "product_reference": "rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-1:1.12.1-2.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.aarch64" }, "product_reference": "rh-nginx112-nginx-1:1.12.1-2.el7.1.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-1:1.12.1-2.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.ppc64le" }, "product_reference": "rh-nginx112-nginx-1:1.12.1-2.el7.1.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-1:1.12.1-2.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.s390x" }, "product_reference": "rh-nginx112-nginx-1:1.12.1-2.el7.1.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-1:1.12.1-2.el7.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.src" }, "product_reference": "rh-nginx112-nginx-1:1.12.1-2.el7.1.src", "relates_to_product_reference": "7Workstation-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-1:1.12.1-2.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.x86_64" }, "product_reference": "rh-nginx112-nginx-1:1.12.1-2.el7.1.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.aarch64" }, "product_reference": "rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.ppc64le" }, "product_reference": "rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.s390x" }, "product_reference": "rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.x86_64" }, "product_reference": "rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.aarch64" }, "product_reference": "rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.ppc64le" }, "product_reference": "rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.s390x" }, "product_reference": "rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.x86_64" }, "product_reference": "rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-mod-http-perl-1:1.12.1-2.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-http-perl-1:1.12.1-2.el7.1.x86_64" }, "product_reference": "rh-nginx112-nginx-mod-http-perl-1:1.12.1-2.el7.1.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.aarch64" }, "product_reference": "rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.ppc64le" }, "product_reference": "rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.s390x" }, "product_reference": "rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.x86_64" }, "product_reference": "rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.aarch64" }, "product_reference": "rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.ppc64le" }, "product_reference": "rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.s390x" }, "product_reference": "rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.x86_64" }, "product_reference": "rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.aarch64" }, "product_reference": "rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.ppc64le" }, "product_reference": "rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.s390x" }, "product_reference": "rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.x86_64" }, "product_reference": "rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.2" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Nginx project" ] } ], "cve": "CVE-2018-16843", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2018-10-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1644511" } ], "notes": [ { "category": "description", "text": "nginx before versions 1.15.6 and 1.14.1 has a vulnerability in the implementation of HTTP/2 that can allow for excessive memory consumption. This issue affects nginx compiled with the ngx_http_v2_module (not compiled by default) if the \u0027http2\u0027 option of the \u0027listen\u0027 directive is used in a configuration file.", "title": "Vulnerability description" }, { "category": "summary", "text": "nginx: Excessive memory consumption via flaw in HTTP/2 implementation", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of rh-nginx18-nginx as shipped with Red Hat Software Collections as they did not include the vulnerable module ngx_http_v2_module.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.src", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-http-perl-1:1.12.1-2.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.src", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-http-perl-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.src", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-http-perl-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.src", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-http-perl-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.aarch64", "7Server-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.src", "7Server-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.aarch64", "7Server-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.aarch64", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-http-perl-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.aarch64", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.aarch64", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.aarch64", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.aarch64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.s390x", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.src", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.aarch64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.s390x", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.aarch64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.s390x", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-http-perl-1:1.12.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.aarch64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.s390x", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.aarch64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.s390x", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.aarch64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.s390x", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-16843" }, { "category": "external", "summary": "RHBZ#1644511", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1644511" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-16843", "url": "https://www.cve.org/CVERecord?id=CVE-2018-16843" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-16843", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-16843" }, { "category": "external", "summary": "http://mailman.nginx.org/pipermail/nginx-announce/2018/000220.html", "url": "http://mailman.nginx.org/pipermail/nginx-announce/2018/000220.html" } ], "release_date": "2018-11-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-11-27T09:04:25+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe rh-nginx112-nginx service must be restarted for this update to take effect.", "product_ids": [ "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.src", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-http-perl-1:1.12.1-2.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.src", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-http-perl-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.src", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-http-perl-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.src", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-http-perl-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.aarch64", "7Server-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.src", "7Server-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.aarch64", "7Server-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.aarch64", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-http-perl-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.aarch64", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.aarch64", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.aarch64", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.aarch64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.s390x", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.src", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.aarch64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.s390x", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.aarch64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.s390x", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-http-perl-1:1.12.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.aarch64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.s390x", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.aarch64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.s390x", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.aarch64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.s390x", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:3680" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.src", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-http-perl-1:1.12.1-2.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.src", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-http-perl-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.src", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-http-perl-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.src", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-http-perl-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.aarch64", "7Server-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.src", "7Server-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.aarch64", "7Server-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.aarch64", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-http-perl-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.aarch64", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.aarch64", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.aarch64", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.aarch64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.s390x", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.src", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.aarch64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.s390x", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.aarch64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.s390x", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-http-perl-1:1.12.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.aarch64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.s390x", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.aarch64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.s390x", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.aarch64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.s390x", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nginx: Excessive memory consumption via flaw in HTTP/2 implementation" }, { "acknowledgments": [ { "names": [ "the Nginx project" ] } ], "cve": "CVE-2018-16844", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2018-10-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1644510" } ], "notes": [ { "category": "description", "text": "nginx before versions 1.15.6 and 1.14.1 has a vulnerability in the implementation of HTTP/2 that can allow for excessive CPU usage. This issue affects nginx compiled with the ngx_http_v2_module (not compiled by default) if the \u0027http2\u0027 option of the \u0027listen\u0027 directive is used in a configuration file.", "title": "Vulnerability description" }, { "category": "summary", "text": "nginx: Excessive CPU usage via flaw in HTTP/2 implementation", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of rh-nginx18-nginx as shipped with Red Hat Software Collections as they did not include the vulnerable module ngx_http_v2_module.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.src", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-http-perl-1:1.12.1-2.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.src", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-http-perl-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.src", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-http-perl-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.src", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-http-perl-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.aarch64", "7Server-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.src", "7Server-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.aarch64", "7Server-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.aarch64", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-http-perl-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.aarch64", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.aarch64", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.aarch64", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.aarch64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.s390x", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.src", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.aarch64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.s390x", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.aarch64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.s390x", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-http-perl-1:1.12.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.aarch64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.s390x", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.aarch64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.s390x", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.aarch64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.s390x", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-16844" }, { "category": "external", "summary": "RHBZ#1644510", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1644510" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-16844", "url": "https://www.cve.org/CVERecord?id=CVE-2018-16844" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-16844", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-16844" }, { "category": "external", "summary": "http://mailman.nginx.org/pipermail/nginx-announce/2018/000220.html", "url": "http://mailman.nginx.org/pipermail/nginx-announce/2018/000220.html" } ], "release_date": "2018-11-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-11-27T09:04:25+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe rh-nginx112-nginx service must be restarted for this update to take effect.", "product_ids": [ "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.src", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-http-perl-1:1.12.1-2.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.src", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-http-perl-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.src", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-http-perl-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.src", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-http-perl-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.aarch64", "7Server-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.src", "7Server-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.aarch64", "7Server-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.aarch64", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-http-perl-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.aarch64", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.aarch64", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.aarch64", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.aarch64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.s390x", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.src", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.aarch64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.s390x", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.aarch64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.s390x", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-http-perl-1:1.12.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.aarch64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.s390x", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.aarch64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.s390x", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.aarch64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.s390x", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:3680" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.src", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-http-perl-1:1.12.1-2.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.src", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-http-perl-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.src", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-http-perl-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.src", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-http-perl-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.aarch64", "7Server-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.src", "7Server-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.aarch64", "7Server-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.aarch64", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-http-perl-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.aarch64", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.aarch64", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.aarch64", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.aarch64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.s390x", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.src", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.aarch64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.s390x", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.aarch64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.s390x", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-http-perl-1:1.12.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.aarch64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.s390x", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.aarch64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.s390x", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.aarch64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.s390x", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nginx: Excessive CPU usage via flaw in HTTP/2 implementation" }, { "acknowledgments": [ { "names": [ "the Nginx project" ] } ], "cve": "CVE-2018-16845", "cwe": { "id": "CWE-201", "name": "Insertion of Sensitive Information Into Sent Data" }, "discovery_date": "2018-10-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1644508" } ], "notes": [ { "category": "description", "text": "An instance of missing input sanitization was found in the mp4 module for nginx. A local attacker could create a specially crafted video file that, when streamed by the server, would cause a denial of service (server crash or hang) and, possibly, information disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "nginx: Denial of service and memory disclosure via mp4 module", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.src", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-http-perl-1:1.12.1-2.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.src", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-http-perl-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.src", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-http-perl-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.src", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-http-perl-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.aarch64", "7Server-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.src", "7Server-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.aarch64", "7Server-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.aarch64", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-http-perl-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.aarch64", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.aarch64", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.aarch64", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.aarch64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.s390x", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.src", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.aarch64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.s390x", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.aarch64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.s390x", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-http-perl-1:1.12.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.aarch64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.s390x", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.aarch64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.s390x", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.aarch64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.s390x", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-16845" }, { "category": "external", "summary": "RHBZ#1644508", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1644508" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-16845", "url": "https://www.cve.org/CVERecord?id=CVE-2018-16845" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-16845", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-16845" }, { "category": "external", "summary": "http://mailman.nginx.org/pipermail/nginx-announce/2018/000221.html", "url": "http://mailman.nginx.org/pipermail/nginx-announce/2018/000221.html" } ], "release_date": "2018-11-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-11-27T09:04:25+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe rh-nginx112-nginx service must be restarted for this update to take effect.", "product_ids": [ "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.src", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-http-perl-1:1.12.1-2.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.src", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-http-perl-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.src", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-http-perl-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.src", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-http-perl-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.aarch64", "7Server-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.src", "7Server-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.aarch64", "7Server-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.aarch64", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-http-perl-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.aarch64", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.aarch64", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.aarch64", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.aarch64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.s390x", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.src", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.aarch64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.s390x", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.aarch64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.s390x", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-http-perl-1:1.12.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.aarch64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.s390x", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.aarch64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.s390x", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.aarch64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.s390x", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:3680" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.src", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-http-perl-1:1.12.1-2.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.src", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-http-perl-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.src", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-http-perl-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.src", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-http-perl-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.aarch64", "7Server-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.src", "7Server-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.aarch64", "7Server-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.aarch64", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-http-perl-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.aarch64", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.aarch64", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.aarch64", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.ppc64le", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.s390x", "7Server-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.aarch64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.s390x", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.src", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-1:1.12.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.aarch64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.s390x", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-debuginfo-1:1.12.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.aarch64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.s390x", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-http-image-filter-1:1.12.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-http-perl-1:1.12.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.aarch64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.s390x", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-http-xslt-filter-1:1.12.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.aarch64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.s390x", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-mail-1:1.12.1-2.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.aarch64", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.s390x", "7Workstation-RHSCL-3.2:rh-nginx112-nginx-mod-stream-1:1.12.1-2.el7.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "nginx: Denial of service and memory disclosure via mp4 module" } ] }
rhsa-2018:3681
Vulnerability from csaf_redhat
Published
2018-11-27 09:18
Modified
2025-08-03 22:20
Summary
Red Hat Security Advisory: rh-nginx114-nginx security update
Notes
Topic
An update for rh-nginx114-nginx is now available for Red Hat Software Collections.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
nginx is a web and proxy server supporting HTTP and other protocols, with a focus on high concurrency, performance, and low memory usage.
The following packages have been upgraded to a later upstream version: rh-nginx114-nginx (1.14.1). (BZ#1648365)
Security Fix(es):
* nginx: Denial of service and memory disclosure via mp4 module (CVE-2018-16845)
* nginx: Excessive memory consumption via flaw in HTTP/2 implementation (CVE-2018-16843)
* nginx: Excessive CPU usage via flaw in HTTP/2 implementation (CVE-2018-16844)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Red Hat would like to thank the Nginx project for reporting these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for rh-nginx114-nginx is now available for Red Hat Software Collections.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "nginx is a web and proxy server supporting HTTP and other protocols, with a focus on high concurrency, performance, and low memory usage.\n\nThe following packages have been upgraded to a later upstream version: rh-nginx114-nginx (1.14.1). (BZ#1648365)\n\nSecurity Fix(es):\n\n* nginx: Denial of service and memory disclosure via mp4 module (CVE-2018-16845)\n\n* nginx: Excessive memory consumption via flaw in HTTP/2 implementation (CVE-2018-16843)\n\n* nginx: Excessive CPU usage via flaw in HTTP/2 implementation (CVE-2018-16844)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank the Nginx project for reporting these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:3681", "url": "https://access.redhat.com/errata/RHSA-2018:3681" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1644508", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1644508" }, { "category": "external", "summary": "1644510", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1644510" }, { "category": "external", "summary": "1644511", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1644511" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_3681.json" } ], "title": "Red Hat Security Advisory: rh-nginx114-nginx security update", "tracking": { "current_release_date": "2025-08-03T22:20:39+00:00", "generator": { "date": "2025-08-03T22:20:39+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2018:3681", "initial_release_date": "2018-11-27T09:18:49+00:00", "revision_history": [ { "date": "2018-11-27T09:18:49+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-11-27T09:18:49+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-03T22:20:39+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-RHSCL-3.2-7.4.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.2-7.5.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.2-7.6.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } } ], "category": "product_family", "name": "Red Hat Software Collections" }, { "branches": [ { "category": "product_version", "name": "rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.aarch64", "product": { "name": "rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.aarch64", "product_id": "rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx114-nginx-mod-stream@1.14.1-1.el7?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.aarch64", "product": { "name": "rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.aarch64", "product_id": "rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx114-nginx-mod-http-xslt-filter@1.14.1-1.el7?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.aarch64", "product": { "name": "rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.aarch64", "product_id": "rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx114-nginx-debuginfo@1.14.1-1.el7?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "rh-nginx114-nginx-1:1.14.1-1.el7.aarch64", "product": { "name": "rh-nginx114-nginx-1:1.14.1-1.el7.aarch64", "product_id": "rh-nginx114-nginx-1:1.14.1-1.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx114-nginx@1.14.1-1.el7?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.aarch64", "product": { "name": "rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.aarch64", "product_id": "rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx114-nginx-mod-http-perl@1.14.1-1.el7?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.aarch64", "product": { "name": "rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.aarch64", "product_id": "rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx114-nginx-mod-http-image-filter@1.14.1-1.el7?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.aarch64", "product": { "name": "rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.aarch64", "product_id": "rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx114-nginx-mod-mail@1.14.1-1.el7?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.s390x", "product": { "name": "rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.s390x", "product_id": "rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx114-nginx-mod-stream@1.14.1-1.el7?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.s390x", "product": { "name": "rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.s390x", "product_id": "rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx114-nginx-mod-http-xslt-filter@1.14.1-1.el7?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.s390x", "product": { "name": "rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.s390x", "product_id": "rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx114-nginx-debuginfo@1.14.1-1.el7?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "rh-nginx114-nginx-1:1.14.1-1.el7.s390x", "product": { "name": "rh-nginx114-nginx-1:1.14.1-1.el7.s390x", "product_id": "rh-nginx114-nginx-1:1.14.1-1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx114-nginx@1.14.1-1.el7?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.s390x", "product": { "name": "rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.s390x", "product_id": "rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx114-nginx-mod-http-perl@1.14.1-1.el7?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.s390x", "product": { "name": "rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.s390x", "product_id": "rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx114-nginx-mod-http-image-filter@1.14.1-1.el7?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.s390x", "product": { "name": "rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.s390x", "product_id": "rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx114-nginx-mod-mail@1.14.1-1.el7?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.ppc64le", "product": { "name": "rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.ppc64le", "product_id": "rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx114-nginx-mod-stream@1.14.1-1.el7?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.ppc64le", "product": { "name": "rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.ppc64le", "product_id": "rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx114-nginx-mod-http-xslt-filter@1.14.1-1.el7?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.ppc64le", "product": { "name": "rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.ppc64le", "product_id": "rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx114-nginx-debuginfo@1.14.1-1.el7?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "rh-nginx114-nginx-1:1.14.1-1.el7.ppc64le", "product": { "name": "rh-nginx114-nginx-1:1.14.1-1.el7.ppc64le", "product_id": "rh-nginx114-nginx-1:1.14.1-1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx114-nginx@1.14.1-1.el7?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.ppc64le", "product": { "name": "rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.ppc64le", "product_id": "rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx114-nginx-mod-http-perl@1.14.1-1.el7?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.ppc64le", "product": { "name": "rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.ppc64le", "product_id": "rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx114-nginx-mod-http-image-filter@1.14.1-1.el7?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.ppc64le", "product": { "name": "rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.ppc64le", "product_id": "rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx114-nginx-mod-mail@1.14.1-1.el7?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "rh-nginx114-nginx-1:1.14.1-1.el7.src", "product": { "name": "rh-nginx114-nginx-1:1.14.1-1.el7.src", "product_id": "rh-nginx114-nginx-1:1.14.1-1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx114-nginx@1.14.1-1.el7?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.x86_64", "product": { "name": "rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.x86_64", "product_id": "rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx114-nginx-mod-stream@1.14.1-1.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.x86_64", "product": { "name": "rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.x86_64", "product_id": "rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx114-nginx-mod-http-xslt-filter@1.14.1-1.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.x86_64", "product": { "name": "rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.x86_64", "product_id": "rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx114-nginx-debuginfo@1.14.1-1.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "rh-nginx114-nginx-1:1.14.1-1.el7.x86_64", "product": { "name": "rh-nginx114-nginx-1:1.14.1-1.el7.x86_64", "product_id": "rh-nginx114-nginx-1:1.14.1-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx114-nginx@1.14.1-1.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.x86_64", "product": { "name": "rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.x86_64", "product_id": "rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx114-nginx-mod-http-perl@1.14.1-1.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.x86_64", "product": { "name": "rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.x86_64", "product_id": "rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx114-nginx-mod-http-image-filter@1.14.1-1.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.x86_64", "product": { "name": "rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.x86_64", "product_id": "rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx114-nginx-mod-mail@1.14.1-1.el7?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-1:1.14.1-1.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.aarch64" }, "product_reference": "rh-nginx114-nginx-1:1.14.1-1.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-1:1.14.1-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.ppc64le" }, "product_reference": "rh-nginx114-nginx-1:1.14.1-1.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-1:1.14.1-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.s390x" }, "product_reference": "rh-nginx114-nginx-1:1.14.1-1.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-1:1.14.1-1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.src" }, "product_reference": "rh-nginx114-nginx-1:1.14.1-1.el7.src", "relates_to_product_reference": "7Server-Alt-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-1:1.14.1-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.x86_64" }, "product_reference": "rh-nginx114-nginx-1:1.14.1-1.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.aarch64" }, "product_reference": "rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.ppc64le" }, "product_reference": "rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.s390x" }, "product_reference": "rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.x86_64" }, "product_reference": "rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.aarch64" }, "product_reference": "rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.ppc64le" }, "product_reference": "rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.s390x" }, "product_reference": "rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.x86_64" }, "product_reference": "rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.aarch64" }, "product_reference": "rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.ppc64le" }, "product_reference": "rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.s390x" }, "product_reference": "rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.x86_64" }, "product_reference": "rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.aarch64" }, "product_reference": "rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.ppc64le" }, "product_reference": "rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.s390x" }, "product_reference": "rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.x86_64" }, "product_reference": "rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.aarch64" }, "product_reference": "rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.ppc64le" }, "product_reference": "rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.s390x" }, "product_reference": "rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.x86_64" }, "product_reference": "rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.aarch64" }, "product_reference": "rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.ppc64le" }, "product_reference": "rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.s390x" }, "product_reference": "rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.x86_64" }, "product_reference": "rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-1:1.14.1-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-1:1.14.1-1.el7.ppc64le" }, "product_reference": "rh-nginx114-nginx-1:1.14.1-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.2-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-1:1.14.1-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-1:1.14.1-1.el7.s390x" }, "product_reference": "rh-nginx114-nginx-1:1.14.1-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.2-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-1:1.14.1-1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-1:1.14.1-1.el7.src" }, "product_reference": "rh-nginx114-nginx-1:1.14.1-1.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.2-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-1:1.14.1-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-1:1.14.1-1.el7.x86_64" }, "product_reference": "rh-nginx114-nginx-1:1.14.1-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.2-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.ppc64le" }, "product_reference": "rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.2-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.s390x" }, "product_reference": "rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.2-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.x86_64" }, "product_reference": "rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.2-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.ppc64le" }, "product_reference": "rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.2-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.s390x" }, "product_reference": "rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.2-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.x86_64" }, "product_reference": "rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.2-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.ppc64le" }, "product_reference": "rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.2-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.s390x" }, "product_reference": "rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.2-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.x86_64" }, "product_reference": "rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.2-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.ppc64le" }, "product_reference": "rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.2-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.s390x" }, "product_reference": "rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.2-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.x86_64" }, "product_reference": "rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.2-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.ppc64le" }, "product_reference": "rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.2-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.s390x" }, "product_reference": "rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.2-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.x86_64" }, "product_reference": "rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.2-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.ppc64le" }, "product_reference": "rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.2-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.s390x" }, "product_reference": "rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.2-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.x86_64" }, "product_reference": "rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.2-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-1:1.14.1-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-1:1.14.1-1.el7.ppc64le" }, "product_reference": "rh-nginx114-nginx-1:1.14.1-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.2-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-1:1.14.1-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-1:1.14.1-1.el7.s390x" }, "product_reference": "rh-nginx114-nginx-1:1.14.1-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.2-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-1:1.14.1-1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-1:1.14.1-1.el7.src" }, "product_reference": "rh-nginx114-nginx-1:1.14.1-1.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.2-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-1:1.14.1-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-1:1.14.1-1.el7.x86_64" }, "product_reference": "rh-nginx114-nginx-1:1.14.1-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.2-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.ppc64le" }, "product_reference": "rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.2-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.s390x" }, "product_reference": "rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.2-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.x86_64" }, "product_reference": "rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.2-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.ppc64le" }, "product_reference": "rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.2-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.s390x" }, "product_reference": "rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.2-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.x86_64" }, "product_reference": "rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.2-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.ppc64le" }, "product_reference": "rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.2-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.s390x" }, "product_reference": "rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.2-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.x86_64" }, "product_reference": "rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.2-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.ppc64le" }, "product_reference": "rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.2-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.s390x" }, "product_reference": "rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.2-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.x86_64" }, "product_reference": "rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.2-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.ppc64le" }, "product_reference": "rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.2-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.s390x" }, "product_reference": "rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.2-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.x86_64" }, "product_reference": "rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.2-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.ppc64le" }, "product_reference": "rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.2-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.s390x" }, "product_reference": "rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.2-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.x86_64" }, "product_reference": "rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.2-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-1:1.14.1-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-1:1.14.1-1.el7.ppc64le" }, "product_reference": "rh-nginx114-nginx-1:1.14.1-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.2-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-1:1.14.1-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-1:1.14.1-1.el7.s390x" }, "product_reference": "rh-nginx114-nginx-1:1.14.1-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.2-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-1:1.14.1-1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-1:1.14.1-1.el7.src" }, "product_reference": "rh-nginx114-nginx-1:1.14.1-1.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.2-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-1:1.14.1-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-1:1.14.1-1.el7.x86_64" }, "product_reference": "rh-nginx114-nginx-1:1.14.1-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.2-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.ppc64le" }, "product_reference": "rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.2-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.s390x" }, "product_reference": "rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.2-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.x86_64" }, "product_reference": "rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.2-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.ppc64le" }, "product_reference": "rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.2-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.s390x" }, "product_reference": "rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.2-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.x86_64" }, "product_reference": "rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.2-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.ppc64le" }, "product_reference": "rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.2-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.s390x" }, "product_reference": "rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.2-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.x86_64" }, "product_reference": "rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.2-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.ppc64le" }, "product_reference": "rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.2-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.s390x" }, "product_reference": "rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.2-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.x86_64" }, "product_reference": "rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.2-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.ppc64le" }, "product_reference": "rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.2-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.s390x" }, "product_reference": "rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.2-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.x86_64" }, "product_reference": "rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.2-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.ppc64le" }, "product_reference": "rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.2-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.s390x" }, "product_reference": "rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.2-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.x86_64" }, "product_reference": "rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.2-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-1:1.14.1-1.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.aarch64" }, "product_reference": "rh-nginx114-nginx-1:1.14.1-1.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-1:1.14.1-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.ppc64le" }, "product_reference": "rh-nginx114-nginx-1:1.14.1-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-1:1.14.1-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.s390x" }, "product_reference": "rh-nginx114-nginx-1:1.14.1-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-1:1.14.1-1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.src" }, "product_reference": "rh-nginx114-nginx-1:1.14.1-1.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-1:1.14.1-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.x86_64" }, "product_reference": "rh-nginx114-nginx-1:1.14.1-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.aarch64" }, "product_reference": "rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.ppc64le" }, "product_reference": "rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.s390x" }, "product_reference": "rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.x86_64" }, "product_reference": "rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.aarch64" }, "product_reference": "rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.ppc64le" }, "product_reference": "rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.s390x" }, "product_reference": "rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.x86_64" }, "product_reference": "rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.aarch64" }, "product_reference": "rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.ppc64le" }, "product_reference": "rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.s390x" }, "product_reference": "rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.x86_64" }, "product_reference": "rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.aarch64" }, "product_reference": "rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.ppc64le" }, "product_reference": "rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.s390x" }, "product_reference": "rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.x86_64" }, "product_reference": "rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.aarch64" }, "product_reference": "rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.ppc64le" }, "product_reference": "rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.s390x" }, "product_reference": "rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.x86_64" }, "product_reference": "rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.aarch64" }, "product_reference": "rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.ppc64le" }, "product_reference": "rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.s390x" }, "product_reference": "rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.x86_64" }, "product_reference": "rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-1:1.14.1-1.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.aarch64" }, "product_reference": "rh-nginx114-nginx-1:1.14.1-1.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-1:1.14.1-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.ppc64le" }, "product_reference": "rh-nginx114-nginx-1:1.14.1-1.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-1:1.14.1-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.s390x" }, "product_reference": "rh-nginx114-nginx-1:1.14.1-1.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-1:1.14.1-1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.src" }, "product_reference": "rh-nginx114-nginx-1:1.14.1-1.el7.src", "relates_to_product_reference": "7Workstation-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-1:1.14.1-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.x86_64" }, "product_reference": "rh-nginx114-nginx-1:1.14.1-1.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.aarch64" }, "product_reference": "rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.ppc64le" }, "product_reference": "rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.s390x" }, "product_reference": "rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.x86_64" }, "product_reference": "rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.aarch64" }, "product_reference": "rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.ppc64le" }, "product_reference": "rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.s390x" }, "product_reference": "rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.x86_64" }, "product_reference": "rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.aarch64" }, "product_reference": "rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.ppc64le" }, "product_reference": "rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.s390x" }, "product_reference": "rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.x86_64" }, "product_reference": "rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.aarch64" }, "product_reference": "rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.ppc64le" }, "product_reference": "rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.s390x" }, "product_reference": "rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.x86_64" }, "product_reference": "rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.aarch64" }, "product_reference": "rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.ppc64le" }, "product_reference": "rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.s390x" }, "product_reference": "rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.x86_64" }, "product_reference": "rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.aarch64" }, "product_reference": "rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.ppc64le" }, "product_reference": "rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.s390x" }, "product_reference": "rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.x86_64" }, "product_reference": "rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.2" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Nginx project" ] } ], "cve": "CVE-2018-16843", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2018-10-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1644511" } ], "notes": [ { "category": "description", "text": "nginx before versions 1.15.6 and 1.14.1 has a vulnerability in the implementation of HTTP/2 that can allow for excessive memory consumption. This issue affects nginx compiled with the ngx_http_v2_module (not compiled by default) if the \u0027http2\u0027 option of the \u0027listen\u0027 directive is used in a configuration file.", "title": "Vulnerability description" }, { "category": "summary", "text": "nginx: Excessive memory consumption via flaw in HTTP/2 implementation", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of rh-nginx18-nginx as shipped with Red Hat Software Collections as they did not include the vulnerable module ngx_http_v2_module.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.src", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-1:1.14.1-1.el7.src", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-1:1.14.1-1.el7.src", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-1:1.14.1-1.el7.src", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.aarch64", "7Server-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.src", "7Server-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.aarch64", "7Server-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.aarch64", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.aarch64", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.aarch64", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.aarch64", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.aarch64", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.x86_64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.aarch64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.s390x", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.src", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.x86_64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.aarch64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.s390x", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.x86_64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.aarch64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.s390x", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.x86_64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.aarch64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.s390x", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.x86_64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.aarch64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.s390x", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.x86_64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.aarch64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.s390x", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.x86_64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.aarch64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.s390x", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-16843" }, { "category": "external", "summary": "RHBZ#1644511", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1644511" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-16843", "url": "https://www.cve.org/CVERecord?id=CVE-2018-16843" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-16843", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-16843" }, { "category": "external", "summary": "http://mailman.nginx.org/pipermail/nginx-announce/2018/000220.html", "url": "http://mailman.nginx.org/pipermail/nginx-announce/2018/000220.html" } ], "release_date": "2018-11-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-11-27T09:18:49+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe rh-nginx114-nginx service must be restarted for this update to take effect.", "product_ids": [ "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.src", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-1:1.14.1-1.el7.src", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-1:1.14.1-1.el7.src", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-1:1.14.1-1.el7.src", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.aarch64", "7Server-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.src", "7Server-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.aarch64", "7Server-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.aarch64", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.aarch64", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.aarch64", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.aarch64", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.aarch64", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.x86_64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.aarch64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.s390x", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.src", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.x86_64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.aarch64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.s390x", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.x86_64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.aarch64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.s390x", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.x86_64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.aarch64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.s390x", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.x86_64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.aarch64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.s390x", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.x86_64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.aarch64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.s390x", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.x86_64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.aarch64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.s390x", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:3681" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.src", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-1:1.14.1-1.el7.src", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-1:1.14.1-1.el7.src", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-1:1.14.1-1.el7.src", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.aarch64", "7Server-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.src", "7Server-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.aarch64", "7Server-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.aarch64", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.aarch64", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.aarch64", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.aarch64", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.aarch64", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.x86_64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.aarch64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.s390x", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.src", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.x86_64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.aarch64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.s390x", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.x86_64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.aarch64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.s390x", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.x86_64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.aarch64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.s390x", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.x86_64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.aarch64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.s390x", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.x86_64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.aarch64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.s390x", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.x86_64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.aarch64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.s390x", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nginx: Excessive memory consumption via flaw in HTTP/2 implementation" }, { "acknowledgments": [ { "names": [ "the Nginx project" ] } ], "cve": "CVE-2018-16844", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2018-10-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1644510" } ], "notes": [ { "category": "description", "text": "nginx before versions 1.15.6 and 1.14.1 has a vulnerability in the implementation of HTTP/2 that can allow for excessive CPU usage. This issue affects nginx compiled with the ngx_http_v2_module (not compiled by default) if the \u0027http2\u0027 option of the \u0027listen\u0027 directive is used in a configuration file.", "title": "Vulnerability description" }, { "category": "summary", "text": "nginx: Excessive CPU usage via flaw in HTTP/2 implementation", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of rh-nginx18-nginx as shipped with Red Hat Software Collections as they did not include the vulnerable module ngx_http_v2_module.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.src", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-1:1.14.1-1.el7.src", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-1:1.14.1-1.el7.src", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-1:1.14.1-1.el7.src", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.aarch64", "7Server-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.src", "7Server-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.aarch64", "7Server-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.aarch64", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.aarch64", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.aarch64", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.aarch64", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.aarch64", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.x86_64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.aarch64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.s390x", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.src", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.x86_64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.aarch64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.s390x", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.x86_64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.aarch64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.s390x", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.x86_64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.aarch64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.s390x", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.x86_64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.aarch64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.s390x", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.x86_64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.aarch64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.s390x", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.x86_64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.aarch64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.s390x", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-16844" }, { "category": "external", "summary": "RHBZ#1644510", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1644510" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-16844", "url": "https://www.cve.org/CVERecord?id=CVE-2018-16844" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-16844", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-16844" }, { "category": "external", "summary": "http://mailman.nginx.org/pipermail/nginx-announce/2018/000220.html", "url": "http://mailman.nginx.org/pipermail/nginx-announce/2018/000220.html" } ], "release_date": "2018-11-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-11-27T09:18:49+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe rh-nginx114-nginx service must be restarted for this update to take effect.", "product_ids": [ "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.src", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-1:1.14.1-1.el7.src", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-1:1.14.1-1.el7.src", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-1:1.14.1-1.el7.src", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.aarch64", "7Server-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.src", "7Server-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.aarch64", "7Server-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.aarch64", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.aarch64", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.aarch64", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.aarch64", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.aarch64", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.x86_64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.aarch64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.s390x", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.src", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.x86_64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.aarch64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.s390x", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.x86_64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.aarch64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.s390x", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.x86_64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.aarch64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.s390x", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.x86_64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.aarch64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.s390x", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.x86_64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.aarch64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.s390x", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.x86_64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.aarch64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.s390x", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:3681" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.src", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-1:1.14.1-1.el7.src", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-1:1.14.1-1.el7.src", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-1:1.14.1-1.el7.src", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.aarch64", "7Server-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.src", "7Server-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.aarch64", "7Server-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.aarch64", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.aarch64", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.aarch64", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.aarch64", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.aarch64", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.x86_64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.aarch64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.s390x", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.src", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.x86_64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.aarch64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.s390x", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.x86_64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.aarch64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.s390x", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.x86_64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.aarch64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.s390x", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.x86_64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.aarch64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.s390x", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.x86_64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.aarch64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.s390x", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.x86_64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.aarch64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.s390x", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nginx: Excessive CPU usage via flaw in HTTP/2 implementation" }, { "acknowledgments": [ { "names": [ "the Nginx project" ] } ], "cve": "CVE-2018-16845", "cwe": { "id": "CWE-201", "name": "Insertion of Sensitive Information Into Sent Data" }, "discovery_date": "2018-10-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1644508" } ], "notes": [ { "category": "description", "text": "An instance of missing input sanitization was found in the mp4 module for nginx. A local attacker could create a specially crafted video file that, when streamed by the server, would cause a denial of service (server crash or hang) and, possibly, information disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "nginx: Denial of service and memory disclosure via mp4 module", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.src", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-1:1.14.1-1.el7.src", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-1:1.14.1-1.el7.src", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-1:1.14.1-1.el7.src", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.aarch64", "7Server-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.src", "7Server-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.aarch64", "7Server-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.aarch64", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.aarch64", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.aarch64", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.aarch64", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.aarch64", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.x86_64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.aarch64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.s390x", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.src", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.x86_64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.aarch64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.s390x", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.x86_64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.aarch64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.s390x", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.x86_64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.aarch64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.s390x", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.x86_64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.aarch64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.s390x", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.x86_64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.aarch64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.s390x", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.x86_64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.aarch64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.s390x", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-16845" }, { "category": "external", "summary": "RHBZ#1644508", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1644508" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-16845", "url": "https://www.cve.org/CVERecord?id=CVE-2018-16845" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-16845", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-16845" }, { "category": "external", "summary": "http://mailman.nginx.org/pipermail/nginx-announce/2018/000221.html", "url": "http://mailman.nginx.org/pipermail/nginx-announce/2018/000221.html" } ], "release_date": "2018-11-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-11-27T09:18:49+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe rh-nginx114-nginx service must be restarted for this update to take effect.", "product_ids": [ "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.src", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-1:1.14.1-1.el7.src", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-1:1.14.1-1.el7.src", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-1:1.14.1-1.el7.src", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.aarch64", "7Server-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.src", "7Server-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.aarch64", "7Server-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.aarch64", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.aarch64", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.aarch64", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.aarch64", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.aarch64", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.x86_64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.aarch64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.s390x", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.src", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.x86_64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.aarch64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.s390x", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.x86_64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.aarch64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.s390x", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.x86_64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.aarch64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.s390x", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.x86_64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.aarch64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.s390x", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.x86_64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.aarch64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.s390x", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.x86_64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.aarch64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.s390x", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:3681" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.src", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.x86_64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.aarch64", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.ppc64le", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.s390x", "7Server-Alt-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-1:1.14.1-1.el7.src", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.4.Z:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-1:1.14.1-1.el7.src", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.5.Z:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-1:1.14.1-1.el7.src", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2-7.6.Z:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.aarch64", "7Server-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.src", "7Server-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.aarch64", "7Server-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.aarch64", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.aarch64", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.aarch64", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.aarch64", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.x86_64", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.aarch64", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.ppc64le", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.s390x", "7Server-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.x86_64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.aarch64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.s390x", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.src", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-1:1.14.1-1.el7.x86_64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.aarch64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.s390x", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-debuginfo-1:1.14.1-1.el7.x86_64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.aarch64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.s390x", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-image-filter-1:1.14.1-1.el7.x86_64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.aarch64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.s390x", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-perl-1:1.14.1-1.el7.x86_64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.aarch64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.s390x", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-http-xslt-filter-1:1.14.1-1.el7.x86_64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.aarch64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.s390x", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-mail-1:1.14.1-1.el7.x86_64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.aarch64", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.ppc64le", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.s390x", "7Workstation-RHSCL-3.2:rh-nginx114-nginx-mod-stream-1:1.14.1-1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "nginx: Denial of service and memory disclosure via mp4 module" } ] }
rhsa-2018:3653
Vulnerability from csaf_redhat
Published
2018-11-26 12:27
Modified
2025-08-03 22:20
Summary
Red Hat Security Advisory: rh-nginx110-nginx security update
Notes
Topic
An update for rh-nginx110-nginx is now available for Red Hat Software Collections.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
nginx is a web and proxy server supporting HTTP and other protocols, with a focus on high concurrency, performance, and low memory usage.
Security Fix(es):
* nginx: Denial of service and memory disclosure via mp4 module (CVE-2018-16845)
* nginx: Excessive memory consumption via flaw in HTTP/2 implementation (CVE-2018-16843)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Red Hat would like to thank the Nginx project for reporting these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for rh-nginx110-nginx is now available for Red Hat Software Collections.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "nginx is a web and proxy server supporting HTTP and other protocols, with a focus on high concurrency, performance, and low memory usage.\n\nSecurity Fix(es):\n\n* nginx: Denial of service and memory disclosure via mp4 module (CVE-2018-16845)\n\n* nginx: Excessive memory consumption via flaw in HTTP/2 implementation (CVE-2018-16843)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank the Nginx project for reporting these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:3653", "url": "https://access.redhat.com/errata/RHSA-2018:3653" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1644508", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1644508" }, { "category": "external", "summary": "1644511", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1644511" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_3653.json" } ], "title": "Red Hat Security Advisory: rh-nginx110-nginx security update", "tracking": { "current_release_date": "2025-08-03T22:20:26+00:00", "generator": { "date": "2025-08-03T22:20:26+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2018:3653", "initial_release_date": "2018-11-26T12:27:39+00:00", "revision_history": [ { "date": "2018-11-26T12:27:39+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-11-26T12:27:39+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-03T22:20:26+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-RHSCL-3.2-7.4.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.2-7.5.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.2-7.6.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-3.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el6" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-3.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el6" } } } ], "category": "product_family", "name": "Red Hat Software Collections" }, { "branches": [ { "category": "product_version", "name": "rh-nginx110-nginx-debuginfo-1:1.10.2-8.el7.1.x86_64", "product": { "name": "rh-nginx110-nginx-debuginfo-1:1.10.2-8.el7.1.x86_64", "product_id": "rh-nginx110-nginx-debuginfo-1:1.10.2-8.el7.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx110-nginx-debuginfo@1.10.2-8.el7.1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "rh-nginx110-nginx-1:1.10.2-8.el7.1.x86_64", "product": { "name": "rh-nginx110-nginx-1:1.10.2-8.el7.1.x86_64", "product_id": "rh-nginx110-nginx-1:1.10.2-8.el7.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx110-nginx@1.10.2-8.el7.1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el7.1.x86_64", "product": { "name": "rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el7.1.x86_64", "product_id": "rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el7.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx110-nginx-mod-http-xslt-filter@1.10.2-8.el7.1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el7.1.x86_64", "product": { "name": "rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el7.1.x86_64", "product_id": "rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el7.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx110-nginx-mod-http-image-filter@1.10.2-8.el7.1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "rh-nginx110-nginx-mod-mail-1:1.10.2-8.el7.1.x86_64", "product": { "name": "rh-nginx110-nginx-mod-mail-1:1.10.2-8.el7.1.x86_64", "product_id": "rh-nginx110-nginx-mod-mail-1:1.10.2-8.el7.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx110-nginx-mod-mail@1.10.2-8.el7.1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el7.1.x86_64", "product": { "name": "rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el7.1.x86_64", "product_id": "rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el7.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx110-nginx-mod-http-perl@1.10.2-8.el7.1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "rh-nginx110-nginx-mod-stream-1:1.10.2-8.el7.1.x86_64", "product": { "name": "rh-nginx110-nginx-mod-stream-1:1.10.2-8.el7.1.x86_64", "product_id": "rh-nginx110-nginx-mod-stream-1:1.10.2-8.el7.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx110-nginx-mod-stream@1.10.2-8.el7.1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el6.1.x86_64", "product": { "name": "rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el6.1.x86_64", "product_id": "rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx110-nginx-mod-http-xslt-filter@1.10.2-8.el6.1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "rh-nginx110-nginx-debuginfo-1:1.10.2-8.el6.1.x86_64", "product": { "name": "rh-nginx110-nginx-debuginfo-1:1.10.2-8.el6.1.x86_64", "product_id": "rh-nginx110-nginx-debuginfo-1:1.10.2-8.el6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx110-nginx-debuginfo@1.10.2-8.el6.1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "rh-nginx110-nginx-mod-stream-1:1.10.2-8.el6.1.x86_64", "product": { "name": "rh-nginx110-nginx-mod-stream-1:1.10.2-8.el6.1.x86_64", "product_id": "rh-nginx110-nginx-mod-stream-1:1.10.2-8.el6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx110-nginx-mod-stream@1.10.2-8.el6.1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "rh-nginx110-nginx-1:1.10.2-8.el6.1.x86_64", "product": { "name": "rh-nginx110-nginx-1:1.10.2-8.el6.1.x86_64", "product_id": "rh-nginx110-nginx-1:1.10.2-8.el6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx110-nginx@1.10.2-8.el6.1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "rh-nginx110-nginx-mod-mail-1:1.10.2-8.el6.1.x86_64", "product": { "name": "rh-nginx110-nginx-mod-mail-1:1.10.2-8.el6.1.x86_64", "product_id": "rh-nginx110-nginx-mod-mail-1:1.10.2-8.el6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx110-nginx-mod-mail@1.10.2-8.el6.1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el6.1.x86_64", "product": { "name": "rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el6.1.x86_64", "product_id": "rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx110-nginx-mod-http-image-filter@1.10.2-8.el6.1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el6.1.x86_64", "product": { "name": "rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el6.1.x86_64", "product_id": "rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx110-nginx-mod-http-perl@1.10.2-8.el6.1?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "rh-nginx110-nginx-1:1.10.2-8.el7.1.src", "product": { "name": "rh-nginx110-nginx-1:1.10.2-8.el7.1.src", "product_id": "rh-nginx110-nginx-1:1.10.2-8.el7.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx110-nginx@1.10.2-8.el7.1?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "rh-nginx110-nginx-1:1.10.2-8.el6.1.src", "product": { "name": "rh-nginx110-nginx-1:1.10.2-8.el6.1.src", "product_id": "rh-nginx110-nginx-1:1.10.2-8.el6.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx110-nginx@1.10.2-8.el6.1?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-1:1.10.2-8.el6.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-3.2:rh-nginx110-nginx-1:1.10.2-8.el6.1.src" }, "product_reference": "rh-nginx110-nginx-1:1.10.2-8.el6.1.src", "relates_to_product_reference": "6Server-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-1:1.10.2-8.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-3.2:rh-nginx110-nginx-1:1.10.2-8.el6.1.x86_64" }, "product_reference": "rh-nginx110-nginx-1:1.10.2-8.el6.1.x86_64", "relates_to_product_reference": "6Server-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-debuginfo-1:1.10.2-8.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-3.2:rh-nginx110-nginx-debuginfo-1:1.10.2-8.el6.1.x86_64" }, "product_reference": "rh-nginx110-nginx-debuginfo-1:1.10.2-8.el6.1.x86_64", "relates_to_product_reference": "6Server-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-3.2:rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el6.1.x86_64" }, "product_reference": "rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el6.1.x86_64", "relates_to_product_reference": "6Server-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-3.2:rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el6.1.x86_64" }, "product_reference": "rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el6.1.x86_64", "relates_to_product_reference": "6Server-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-3.2:rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el6.1.x86_64" }, "product_reference": "rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el6.1.x86_64", "relates_to_product_reference": "6Server-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-mod-mail-1:1.10.2-8.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-3.2:rh-nginx110-nginx-mod-mail-1:1.10.2-8.el6.1.x86_64" }, "product_reference": "rh-nginx110-nginx-mod-mail-1:1.10.2-8.el6.1.x86_64", "relates_to_product_reference": "6Server-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-mod-stream-1:1.10.2-8.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-3.2:rh-nginx110-nginx-mod-stream-1:1.10.2-8.el6.1.x86_64" }, "product_reference": "rh-nginx110-nginx-mod-stream-1:1.10.2-8.el6.1.x86_64", "relates_to_product_reference": "6Server-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-1:1.10.2-8.el6.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-3.2:rh-nginx110-nginx-1:1.10.2-8.el6.1.src" }, "product_reference": "rh-nginx110-nginx-1:1.10.2-8.el6.1.src", "relates_to_product_reference": "6Workstation-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-1:1.10.2-8.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-3.2:rh-nginx110-nginx-1:1.10.2-8.el6.1.x86_64" }, "product_reference": "rh-nginx110-nginx-1:1.10.2-8.el6.1.x86_64", "relates_to_product_reference": "6Workstation-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-debuginfo-1:1.10.2-8.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-3.2:rh-nginx110-nginx-debuginfo-1:1.10.2-8.el6.1.x86_64" }, "product_reference": "rh-nginx110-nginx-debuginfo-1:1.10.2-8.el6.1.x86_64", "relates_to_product_reference": "6Workstation-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-3.2:rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el6.1.x86_64" }, "product_reference": "rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el6.1.x86_64", "relates_to_product_reference": "6Workstation-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-3.2:rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el6.1.x86_64" }, "product_reference": "rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el6.1.x86_64", "relates_to_product_reference": "6Workstation-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-3.2:rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el6.1.x86_64" }, "product_reference": "rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el6.1.x86_64", "relates_to_product_reference": "6Workstation-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-mod-mail-1:1.10.2-8.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-3.2:rh-nginx110-nginx-mod-mail-1:1.10.2-8.el6.1.x86_64" }, "product_reference": "rh-nginx110-nginx-mod-mail-1:1.10.2-8.el6.1.x86_64", "relates_to_product_reference": "6Workstation-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-mod-stream-1:1.10.2-8.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-3.2:rh-nginx110-nginx-mod-stream-1:1.10.2-8.el6.1.x86_64" }, "product_reference": "rh-nginx110-nginx-mod-stream-1:1.10.2-8.el6.1.x86_64", "relates_to_product_reference": "6Workstation-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-1:1.10.2-8.el7.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-RHSCL-3.2-7.4.Z:rh-nginx110-nginx-1:1.10.2-8.el7.1.src" }, "product_reference": "rh-nginx110-nginx-1:1.10.2-8.el7.1.src", "relates_to_product_reference": "7Server-RHSCL-3.2-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-1:1.10.2-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-RHSCL-3.2-7.4.Z:rh-nginx110-nginx-1:1.10.2-8.el7.1.x86_64" }, "product_reference": "rh-nginx110-nginx-1:1.10.2-8.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.2-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-debuginfo-1:1.10.2-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-RHSCL-3.2-7.4.Z:rh-nginx110-nginx-debuginfo-1:1.10.2-8.el7.1.x86_64" }, "product_reference": "rh-nginx110-nginx-debuginfo-1:1.10.2-8.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.2-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-RHSCL-3.2-7.4.Z:rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el7.1.x86_64" }, "product_reference": "rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.2-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-RHSCL-3.2-7.4.Z:rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el7.1.x86_64" }, "product_reference": "rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.2-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-RHSCL-3.2-7.4.Z:rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el7.1.x86_64" }, "product_reference": "rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.2-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-mod-mail-1:1.10.2-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-RHSCL-3.2-7.4.Z:rh-nginx110-nginx-mod-mail-1:1.10.2-8.el7.1.x86_64" }, "product_reference": "rh-nginx110-nginx-mod-mail-1:1.10.2-8.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.2-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-mod-stream-1:1.10.2-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-RHSCL-3.2-7.4.Z:rh-nginx110-nginx-mod-stream-1:1.10.2-8.el7.1.x86_64" }, "product_reference": "rh-nginx110-nginx-mod-stream-1:1.10.2-8.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.2-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-1:1.10.2-8.el7.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.2-7.5.Z:rh-nginx110-nginx-1:1.10.2-8.el7.1.src" }, "product_reference": "rh-nginx110-nginx-1:1.10.2-8.el7.1.src", "relates_to_product_reference": "7Server-RHSCL-3.2-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-1:1.10.2-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.2-7.5.Z:rh-nginx110-nginx-1:1.10.2-8.el7.1.x86_64" }, "product_reference": "rh-nginx110-nginx-1:1.10.2-8.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.2-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-debuginfo-1:1.10.2-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.2-7.5.Z:rh-nginx110-nginx-debuginfo-1:1.10.2-8.el7.1.x86_64" }, "product_reference": "rh-nginx110-nginx-debuginfo-1:1.10.2-8.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.2-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.2-7.5.Z:rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el7.1.x86_64" }, "product_reference": "rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.2-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.2-7.5.Z:rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el7.1.x86_64" }, "product_reference": "rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.2-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.2-7.5.Z:rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el7.1.x86_64" }, "product_reference": "rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.2-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-mod-mail-1:1.10.2-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.2-7.5.Z:rh-nginx110-nginx-mod-mail-1:1.10.2-8.el7.1.x86_64" }, "product_reference": "rh-nginx110-nginx-mod-mail-1:1.10.2-8.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.2-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-mod-stream-1:1.10.2-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.2-7.5.Z:rh-nginx110-nginx-mod-stream-1:1.10.2-8.el7.1.x86_64" }, "product_reference": "rh-nginx110-nginx-mod-stream-1:1.10.2-8.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.2-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-1:1.10.2-8.el7.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.2-7.6.Z:rh-nginx110-nginx-1:1.10.2-8.el7.1.src" }, "product_reference": "rh-nginx110-nginx-1:1.10.2-8.el7.1.src", "relates_to_product_reference": "7Server-RHSCL-3.2-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-1:1.10.2-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.2-7.6.Z:rh-nginx110-nginx-1:1.10.2-8.el7.1.x86_64" }, "product_reference": "rh-nginx110-nginx-1:1.10.2-8.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.2-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-debuginfo-1:1.10.2-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.2-7.6.Z:rh-nginx110-nginx-debuginfo-1:1.10.2-8.el7.1.x86_64" }, "product_reference": "rh-nginx110-nginx-debuginfo-1:1.10.2-8.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.2-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.2-7.6.Z:rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el7.1.x86_64" }, "product_reference": "rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.2-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.2-7.6.Z:rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el7.1.x86_64" }, "product_reference": "rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.2-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.2-7.6.Z:rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el7.1.x86_64" }, "product_reference": "rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.2-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-mod-mail-1:1.10.2-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.2-7.6.Z:rh-nginx110-nginx-mod-mail-1:1.10.2-8.el7.1.x86_64" }, "product_reference": "rh-nginx110-nginx-mod-mail-1:1.10.2-8.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.2-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-mod-stream-1:1.10.2-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.2-7.6.Z:rh-nginx110-nginx-mod-stream-1:1.10.2-8.el7.1.x86_64" }, "product_reference": "rh-nginx110-nginx-mod-stream-1:1.10.2-8.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.2-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-1:1.10.2-8.el7.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.2:rh-nginx110-nginx-1:1.10.2-8.el7.1.src" }, "product_reference": "rh-nginx110-nginx-1:1.10.2-8.el7.1.src", "relates_to_product_reference": "7Server-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-1:1.10.2-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.2:rh-nginx110-nginx-1:1.10.2-8.el7.1.x86_64" }, "product_reference": "rh-nginx110-nginx-1:1.10.2-8.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-debuginfo-1:1.10.2-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.2:rh-nginx110-nginx-debuginfo-1:1.10.2-8.el7.1.x86_64" }, "product_reference": "rh-nginx110-nginx-debuginfo-1:1.10.2-8.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.2:rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el7.1.x86_64" }, "product_reference": "rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.2:rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el7.1.x86_64" }, "product_reference": "rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.2:rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el7.1.x86_64" }, "product_reference": "rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-mod-mail-1:1.10.2-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.2:rh-nginx110-nginx-mod-mail-1:1.10.2-8.el7.1.x86_64" }, "product_reference": "rh-nginx110-nginx-mod-mail-1:1.10.2-8.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-mod-stream-1:1.10.2-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.2:rh-nginx110-nginx-mod-stream-1:1.10.2-8.el7.1.x86_64" }, "product_reference": "rh-nginx110-nginx-mod-stream-1:1.10.2-8.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-1:1.10.2-8.el7.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.2:rh-nginx110-nginx-1:1.10.2-8.el7.1.src" }, "product_reference": "rh-nginx110-nginx-1:1.10.2-8.el7.1.src", "relates_to_product_reference": "7Workstation-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-1:1.10.2-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.2:rh-nginx110-nginx-1:1.10.2-8.el7.1.x86_64" }, "product_reference": "rh-nginx110-nginx-1:1.10.2-8.el7.1.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-debuginfo-1:1.10.2-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.2:rh-nginx110-nginx-debuginfo-1:1.10.2-8.el7.1.x86_64" }, "product_reference": "rh-nginx110-nginx-debuginfo-1:1.10.2-8.el7.1.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.2:rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el7.1.x86_64" }, "product_reference": "rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el7.1.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.2:rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el7.1.x86_64" }, "product_reference": "rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el7.1.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.2:rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el7.1.x86_64" }, "product_reference": "rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el7.1.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-mod-mail-1:1.10.2-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.2:rh-nginx110-nginx-mod-mail-1:1.10.2-8.el7.1.x86_64" }, "product_reference": "rh-nginx110-nginx-mod-mail-1:1.10.2-8.el7.1.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-mod-stream-1:1.10.2-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.2:rh-nginx110-nginx-mod-stream-1:1.10.2-8.el7.1.x86_64" }, "product_reference": "rh-nginx110-nginx-mod-stream-1:1.10.2-8.el7.1.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.2" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Nginx project" ] } ], "cve": "CVE-2018-16843", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2018-10-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1644511" } ], "notes": [ { "category": "description", "text": "nginx before versions 1.15.6 and 1.14.1 has a vulnerability in the implementation of HTTP/2 that can allow for excessive memory consumption. This issue affects nginx compiled with the ngx_http_v2_module (not compiled by default) if the \u0027http2\u0027 option of the \u0027listen\u0027 directive is used in a configuration file.", "title": "Vulnerability description" }, { "category": "summary", "text": "nginx: Excessive memory consumption via flaw in HTTP/2 implementation", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of rh-nginx18-nginx as shipped with Red Hat Software Collections as they did not include the vulnerable module ngx_http_v2_module.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHSCL-3.2:rh-nginx110-nginx-1:1.10.2-8.el6.1.src", "6Server-RHSCL-3.2:rh-nginx110-nginx-1:1.10.2-8.el6.1.x86_64", "6Server-RHSCL-3.2:rh-nginx110-nginx-debuginfo-1:1.10.2-8.el6.1.x86_64", "6Server-RHSCL-3.2:rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el6.1.x86_64", "6Server-RHSCL-3.2:rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el6.1.x86_64", "6Server-RHSCL-3.2:rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el6.1.x86_64", "6Server-RHSCL-3.2:rh-nginx110-nginx-mod-mail-1:1.10.2-8.el6.1.x86_64", "6Server-RHSCL-3.2:rh-nginx110-nginx-mod-stream-1:1.10.2-8.el6.1.x86_64", "6Workstation-RHSCL-3.2:rh-nginx110-nginx-1:1.10.2-8.el6.1.src", "6Workstation-RHSCL-3.2:rh-nginx110-nginx-1:1.10.2-8.el6.1.x86_64", "6Workstation-RHSCL-3.2:rh-nginx110-nginx-debuginfo-1:1.10.2-8.el6.1.x86_64", "6Workstation-RHSCL-3.2:rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el6.1.x86_64", "6Workstation-RHSCL-3.2:rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el6.1.x86_64", "6Workstation-RHSCL-3.2:rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el6.1.x86_64", "6Workstation-RHSCL-3.2:rh-nginx110-nginx-mod-mail-1:1.10.2-8.el6.1.x86_64", "6Workstation-RHSCL-3.2:rh-nginx110-nginx-mod-stream-1:1.10.2-8.el6.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx110-nginx-1:1.10.2-8.el7.1.src", "7Server-RHSCL-3.2-7.4.Z:rh-nginx110-nginx-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx110-nginx-debuginfo-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx110-nginx-mod-mail-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx110-nginx-mod-stream-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx110-nginx-1:1.10.2-8.el7.1.src", "7Server-RHSCL-3.2-7.5.Z:rh-nginx110-nginx-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx110-nginx-debuginfo-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx110-nginx-mod-mail-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx110-nginx-mod-stream-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx110-nginx-1:1.10.2-8.el7.1.src", "7Server-RHSCL-3.2-7.6.Z:rh-nginx110-nginx-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx110-nginx-debuginfo-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx110-nginx-mod-mail-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx110-nginx-mod-stream-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx110-nginx-1:1.10.2-8.el7.1.src", "7Server-RHSCL-3.2:rh-nginx110-nginx-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx110-nginx-debuginfo-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx110-nginx-mod-mail-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx110-nginx-mod-stream-1:1.10.2-8.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx110-nginx-1:1.10.2-8.el7.1.src", "7Workstation-RHSCL-3.2:rh-nginx110-nginx-1:1.10.2-8.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx110-nginx-debuginfo-1:1.10.2-8.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx110-nginx-mod-mail-1:1.10.2-8.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx110-nginx-mod-stream-1:1.10.2-8.el7.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-16843" }, { "category": "external", "summary": "RHBZ#1644511", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1644511" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-16843", "url": "https://www.cve.org/CVERecord?id=CVE-2018-16843" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-16843", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-16843" }, { "category": "external", "summary": "http://mailman.nginx.org/pipermail/nginx-announce/2018/000220.html", "url": "http://mailman.nginx.org/pipermail/nginx-announce/2018/000220.html" } ], "release_date": "2018-11-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-11-26T12:27:39+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe rh-nginx110-nginx service must be restarted for this update to take effect.", "product_ids": [ "6Server-RHSCL-3.2:rh-nginx110-nginx-1:1.10.2-8.el6.1.src", "6Server-RHSCL-3.2:rh-nginx110-nginx-1:1.10.2-8.el6.1.x86_64", "6Server-RHSCL-3.2:rh-nginx110-nginx-debuginfo-1:1.10.2-8.el6.1.x86_64", "6Server-RHSCL-3.2:rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el6.1.x86_64", "6Server-RHSCL-3.2:rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el6.1.x86_64", "6Server-RHSCL-3.2:rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el6.1.x86_64", "6Server-RHSCL-3.2:rh-nginx110-nginx-mod-mail-1:1.10.2-8.el6.1.x86_64", "6Server-RHSCL-3.2:rh-nginx110-nginx-mod-stream-1:1.10.2-8.el6.1.x86_64", "6Workstation-RHSCL-3.2:rh-nginx110-nginx-1:1.10.2-8.el6.1.src", "6Workstation-RHSCL-3.2:rh-nginx110-nginx-1:1.10.2-8.el6.1.x86_64", "6Workstation-RHSCL-3.2:rh-nginx110-nginx-debuginfo-1:1.10.2-8.el6.1.x86_64", "6Workstation-RHSCL-3.2:rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el6.1.x86_64", "6Workstation-RHSCL-3.2:rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el6.1.x86_64", "6Workstation-RHSCL-3.2:rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el6.1.x86_64", "6Workstation-RHSCL-3.2:rh-nginx110-nginx-mod-mail-1:1.10.2-8.el6.1.x86_64", "6Workstation-RHSCL-3.2:rh-nginx110-nginx-mod-stream-1:1.10.2-8.el6.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx110-nginx-1:1.10.2-8.el7.1.src", "7Server-RHSCL-3.2-7.4.Z:rh-nginx110-nginx-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx110-nginx-debuginfo-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx110-nginx-mod-mail-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx110-nginx-mod-stream-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx110-nginx-1:1.10.2-8.el7.1.src", "7Server-RHSCL-3.2-7.5.Z:rh-nginx110-nginx-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx110-nginx-debuginfo-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx110-nginx-mod-mail-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx110-nginx-mod-stream-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx110-nginx-1:1.10.2-8.el7.1.src", "7Server-RHSCL-3.2-7.6.Z:rh-nginx110-nginx-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx110-nginx-debuginfo-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx110-nginx-mod-mail-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx110-nginx-mod-stream-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx110-nginx-1:1.10.2-8.el7.1.src", "7Server-RHSCL-3.2:rh-nginx110-nginx-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx110-nginx-debuginfo-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx110-nginx-mod-mail-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx110-nginx-mod-stream-1:1.10.2-8.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx110-nginx-1:1.10.2-8.el7.1.src", "7Workstation-RHSCL-3.2:rh-nginx110-nginx-1:1.10.2-8.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx110-nginx-debuginfo-1:1.10.2-8.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx110-nginx-mod-mail-1:1.10.2-8.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx110-nginx-mod-stream-1:1.10.2-8.el7.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:3653" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "6Server-RHSCL-3.2:rh-nginx110-nginx-1:1.10.2-8.el6.1.src", "6Server-RHSCL-3.2:rh-nginx110-nginx-1:1.10.2-8.el6.1.x86_64", "6Server-RHSCL-3.2:rh-nginx110-nginx-debuginfo-1:1.10.2-8.el6.1.x86_64", "6Server-RHSCL-3.2:rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el6.1.x86_64", "6Server-RHSCL-3.2:rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el6.1.x86_64", "6Server-RHSCL-3.2:rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el6.1.x86_64", "6Server-RHSCL-3.2:rh-nginx110-nginx-mod-mail-1:1.10.2-8.el6.1.x86_64", "6Server-RHSCL-3.2:rh-nginx110-nginx-mod-stream-1:1.10.2-8.el6.1.x86_64", "6Workstation-RHSCL-3.2:rh-nginx110-nginx-1:1.10.2-8.el6.1.src", "6Workstation-RHSCL-3.2:rh-nginx110-nginx-1:1.10.2-8.el6.1.x86_64", "6Workstation-RHSCL-3.2:rh-nginx110-nginx-debuginfo-1:1.10.2-8.el6.1.x86_64", "6Workstation-RHSCL-3.2:rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el6.1.x86_64", "6Workstation-RHSCL-3.2:rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el6.1.x86_64", "6Workstation-RHSCL-3.2:rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el6.1.x86_64", "6Workstation-RHSCL-3.2:rh-nginx110-nginx-mod-mail-1:1.10.2-8.el6.1.x86_64", "6Workstation-RHSCL-3.2:rh-nginx110-nginx-mod-stream-1:1.10.2-8.el6.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx110-nginx-1:1.10.2-8.el7.1.src", "7Server-RHSCL-3.2-7.4.Z:rh-nginx110-nginx-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx110-nginx-debuginfo-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx110-nginx-mod-mail-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx110-nginx-mod-stream-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx110-nginx-1:1.10.2-8.el7.1.src", "7Server-RHSCL-3.2-7.5.Z:rh-nginx110-nginx-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx110-nginx-debuginfo-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx110-nginx-mod-mail-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx110-nginx-mod-stream-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx110-nginx-1:1.10.2-8.el7.1.src", "7Server-RHSCL-3.2-7.6.Z:rh-nginx110-nginx-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx110-nginx-debuginfo-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx110-nginx-mod-mail-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx110-nginx-mod-stream-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx110-nginx-1:1.10.2-8.el7.1.src", "7Server-RHSCL-3.2:rh-nginx110-nginx-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx110-nginx-debuginfo-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx110-nginx-mod-mail-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx110-nginx-mod-stream-1:1.10.2-8.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx110-nginx-1:1.10.2-8.el7.1.src", "7Workstation-RHSCL-3.2:rh-nginx110-nginx-1:1.10.2-8.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx110-nginx-debuginfo-1:1.10.2-8.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx110-nginx-mod-mail-1:1.10.2-8.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx110-nginx-mod-stream-1:1.10.2-8.el7.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nginx: Excessive memory consumption via flaw in HTTP/2 implementation" }, { "acknowledgments": [ { "names": [ "the Nginx project" ] } ], "cve": "CVE-2018-16845", "cwe": { "id": "CWE-201", "name": "Insertion of Sensitive Information Into Sent Data" }, "discovery_date": "2018-10-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1644508" } ], "notes": [ { "category": "description", "text": "An instance of missing input sanitization was found in the mp4 module for nginx. A local attacker could create a specially crafted video file that, when streamed by the server, would cause a denial of service (server crash or hang) and, possibly, information disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "nginx: Denial of service and memory disclosure via mp4 module", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHSCL-3.2:rh-nginx110-nginx-1:1.10.2-8.el6.1.src", "6Server-RHSCL-3.2:rh-nginx110-nginx-1:1.10.2-8.el6.1.x86_64", "6Server-RHSCL-3.2:rh-nginx110-nginx-debuginfo-1:1.10.2-8.el6.1.x86_64", "6Server-RHSCL-3.2:rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el6.1.x86_64", "6Server-RHSCL-3.2:rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el6.1.x86_64", "6Server-RHSCL-3.2:rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el6.1.x86_64", "6Server-RHSCL-3.2:rh-nginx110-nginx-mod-mail-1:1.10.2-8.el6.1.x86_64", "6Server-RHSCL-3.2:rh-nginx110-nginx-mod-stream-1:1.10.2-8.el6.1.x86_64", "6Workstation-RHSCL-3.2:rh-nginx110-nginx-1:1.10.2-8.el6.1.src", "6Workstation-RHSCL-3.2:rh-nginx110-nginx-1:1.10.2-8.el6.1.x86_64", "6Workstation-RHSCL-3.2:rh-nginx110-nginx-debuginfo-1:1.10.2-8.el6.1.x86_64", "6Workstation-RHSCL-3.2:rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el6.1.x86_64", "6Workstation-RHSCL-3.2:rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el6.1.x86_64", "6Workstation-RHSCL-3.2:rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el6.1.x86_64", "6Workstation-RHSCL-3.2:rh-nginx110-nginx-mod-mail-1:1.10.2-8.el6.1.x86_64", "6Workstation-RHSCL-3.2:rh-nginx110-nginx-mod-stream-1:1.10.2-8.el6.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx110-nginx-1:1.10.2-8.el7.1.src", "7Server-RHSCL-3.2-7.4.Z:rh-nginx110-nginx-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx110-nginx-debuginfo-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx110-nginx-mod-mail-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx110-nginx-mod-stream-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx110-nginx-1:1.10.2-8.el7.1.src", "7Server-RHSCL-3.2-7.5.Z:rh-nginx110-nginx-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx110-nginx-debuginfo-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx110-nginx-mod-mail-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx110-nginx-mod-stream-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx110-nginx-1:1.10.2-8.el7.1.src", "7Server-RHSCL-3.2-7.6.Z:rh-nginx110-nginx-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx110-nginx-debuginfo-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx110-nginx-mod-mail-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx110-nginx-mod-stream-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx110-nginx-1:1.10.2-8.el7.1.src", "7Server-RHSCL-3.2:rh-nginx110-nginx-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx110-nginx-debuginfo-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx110-nginx-mod-mail-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx110-nginx-mod-stream-1:1.10.2-8.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx110-nginx-1:1.10.2-8.el7.1.src", "7Workstation-RHSCL-3.2:rh-nginx110-nginx-1:1.10.2-8.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx110-nginx-debuginfo-1:1.10.2-8.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx110-nginx-mod-mail-1:1.10.2-8.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx110-nginx-mod-stream-1:1.10.2-8.el7.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-16845" }, { "category": "external", "summary": "RHBZ#1644508", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1644508" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-16845", "url": "https://www.cve.org/CVERecord?id=CVE-2018-16845" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-16845", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-16845" }, { "category": "external", "summary": "http://mailman.nginx.org/pipermail/nginx-announce/2018/000221.html", "url": "http://mailman.nginx.org/pipermail/nginx-announce/2018/000221.html" } ], "release_date": "2018-11-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-11-26T12:27:39+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe rh-nginx110-nginx service must be restarted for this update to take effect.", "product_ids": [ "6Server-RHSCL-3.2:rh-nginx110-nginx-1:1.10.2-8.el6.1.src", "6Server-RHSCL-3.2:rh-nginx110-nginx-1:1.10.2-8.el6.1.x86_64", "6Server-RHSCL-3.2:rh-nginx110-nginx-debuginfo-1:1.10.2-8.el6.1.x86_64", "6Server-RHSCL-3.2:rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el6.1.x86_64", "6Server-RHSCL-3.2:rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el6.1.x86_64", "6Server-RHSCL-3.2:rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el6.1.x86_64", "6Server-RHSCL-3.2:rh-nginx110-nginx-mod-mail-1:1.10.2-8.el6.1.x86_64", "6Server-RHSCL-3.2:rh-nginx110-nginx-mod-stream-1:1.10.2-8.el6.1.x86_64", "6Workstation-RHSCL-3.2:rh-nginx110-nginx-1:1.10.2-8.el6.1.src", "6Workstation-RHSCL-3.2:rh-nginx110-nginx-1:1.10.2-8.el6.1.x86_64", "6Workstation-RHSCL-3.2:rh-nginx110-nginx-debuginfo-1:1.10.2-8.el6.1.x86_64", "6Workstation-RHSCL-3.2:rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el6.1.x86_64", "6Workstation-RHSCL-3.2:rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el6.1.x86_64", "6Workstation-RHSCL-3.2:rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el6.1.x86_64", "6Workstation-RHSCL-3.2:rh-nginx110-nginx-mod-mail-1:1.10.2-8.el6.1.x86_64", "6Workstation-RHSCL-3.2:rh-nginx110-nginx-mod-stream-1:1.10.2-8.el6.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx110-nginx-1:1.10.2-8.el7.1.src", "7Server-RHSCL-3.2-7.4.Z:rh-nginx110-nginx-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx110-nginx-debuginfo-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx110-nginx-mod-mail-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx110-nginx-mod-stream-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx110-nginx-1:1.10.2-8.el7.1.src", "7Server-RHSCL-3.2-7.5.Z:rh-nginx110-nginx-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx110-nginx-debuginfo-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx110-nginx-mod-mail-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx110-nginx-mod-stream-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx110-nginx-1:1.10.2-8.el7.1.src", "7Server-RHSCL-3.2-7.6.Z:rh-nginx110-nginx-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx110-nginx-debuginfo-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx110-nginx-mod-mail-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx110-nginx-mod-stream-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx110-nginx-1:1.10.2-8.el7.1.src", "7Server-RHSCL-3.2:rh-nginx110-nginx-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx110-nginx-debuginfo-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx110-nginx-mod-mail-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx110-nginx-mod-stream-1:1.10.2-8.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx110-nginx-1:1.10.2-8.el7.1.src", "7Workstation-RHSCL-3.2:rh-nginx110-nginx-1:1.10.2-8.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx110-nginx-debuginfo-1:1.10.2-8.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx110-nginx-mod-mail-1:1.10.2-8.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx110-nginx-mod-stream-1:1.10.2-8.el7.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:3653" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.0" }, "products": [ "6Server-RHSCL-3.2:rh-nginx110-nginx-1:1.10.2-8.el6.1.src", "6Server-RHSCL-3.2:rh-nginx110-nginx-1:1.10.2-8.el6.1.x86_64", "6Server-RHSCL-3.2:rh-nginx110-nginx-debuginfo-1:1.10.2-8.el6.1.x86_64", "6Server-RHSCL-3.2:rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el6.1.x86_64", "6Server-RHSCL-3.2:rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el6.1.x86_64", "6Server-RHSCL-3.2:rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el6.1.x86_64", "6Server-RHSCL-3.2:rh-nginx110-nginx-mod-mail-1:1.10.2-8.el6.1.x86_64", "6Server-RHSCL-3.2:rh-nginx110-nginx-mod-stream-1:1.10.2-8.el6.1.x86_64", "6Workstation-RHSCL-3.2:rh-nginx110-nginx-1:1.10.2-8.el6.1.src", "6Workstation-RHSCL-3.2:rh-nginx110-nginx-1:1.10.2-8.el6.1.x86_64", "6Workstation-RHSCL-3.2:rh-nginx110-nginx-debuginfo-1:1.10.2-8.el6.1.x86_64", "6Workstation-RHSCL-3.2:rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el6.1.x86_64", "6Workstation-RHSCL-3.2:rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el6.1.x86_64", "6Workstation-RHSCL-3.2:rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el6.1.x86_64", "6Workstation-RHSCL-3.2:rh-nginx110-nginx-mod-mail-1:1.10.2-8.el6.1.x86_64", "6Workstation-RHSCL-3.2:rh-nginx110-nginx-mod-stream-1:1.10.2-8.el6.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx110-nginx-1:1.10.2-8.el7.1.src", "7Server-RHSCL-3.2-7.4.Z:rh-nginx110-nginx-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx110-nginx-debuginfo-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx110-nginx-mod-mail-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.4.Z:rh-nginx110-nginx-mod-stream-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx110-nginx-1:1.10.2-8.el7.1.src", "7Server-RHSCL-3.2-7.5.Z:rh-nginx110-nginx-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx110-nginx-debuginfo-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx110-nginx-mod-mail-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.5.Z:rh-nginx110-nginx-mod-stream-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx110-nginx-1:1.10.2-8.el7.1.src", "7Server-RHSCL-3.2-7.6.Z:rh-nginx110-nginx-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx110-nginx-debuginfo-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx110-nginx-mod-mail-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2-7.6.Z:rh-nginx110-nginx-mod-stream-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx110-nginx-1:1.10.2-8.el7.1.src", "7Server-RHSCL-3.2:rh-nginx110-nginx-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx110-nginx-debuginfo-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx110-nginx-mod-mail-1:1.10.2-8.el7.1.x86_64", "7Server-RHSCL-3.2:rh-nginx110-nginx-mod-stream-1:1.10.2-8.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx110-nginx-1:1.10.2-8.el7.1.src", "7Workstation-RHSCL-3.2:rh-nginx110-nginx-1:1.10.2-8.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx110-nginx-debuginfo-1:1.10.2-8.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx110-nginx-mod-mail-1:1.10.2-8.el7.1.x86_64", "7Workstation-RHSCL-3.2:rh-nginx110-nginx-mod-stream-1:1.10.2-8.el7.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "nginx: Denial of service and memory disclosure via mp4 module" } ] }
fkie_cve-2018-16845
Vulnerability from fkie_nvd
Published
2018-11-07 14:29
Modified
2024-11-21 03:53
Severity ?
Summary
nginx before versions 1.15.6, 1.14.1 has a vulnerability in the ngx_http_mp4_module, which might allow an attacker to cause infinite loop in a worker process, cause a worker process crash, or might result in worker process memory disclosure by using a specially crafted mp4 file. The issue only affects nginx if it is built with the ngx_http_mp4_module (the module is not built by default) and the .mp4. directive is used in the configuration file. Further, the attack is only possible if an attacker is able to trigger processing of a specially crafted mp4 file with the ngx_http_mp4_module.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00035.html | Mailing List, Third Party Advisory | |
secalert@redhat.com | http://mailman.nginx.org/pipermail/nginx-announce/2018/000221.html | Mailing List, Patch, Vendor Advisory | |
secalert@redhat.com | http://seclists.org/fulldisclosure/2021/Sep/36 | Mailing List, Third Party Advisory | |
secalert@redhat.com | http://www.securityfocus.com/bid/105868 | Third Party Advisory, VDB Entry | |
secalert@redhat.com | http://www.securitytracker.com/id/1042039 | Third Party Advisory, VDB Entry | |
secalert@redhat.com | https://access.redhat.com/errata/RHSA-2018:3652 | Third Party Advisory | |
secalert@redhat.com | https://access.redhat.com/errata/RHSA-2018:3653 | Third Party Advisory | |
secalert@redhat.com | https://access.redhat.com/errata/RHSA-2018:3680 | Third Party Advisory | |
secalert@redhat.com | https://access.redhat.com/errata/RHSA-2018:3681 | Third Party Advisory | |
secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16845 | Issue Tracking, Third Party Advisory | |
secalert@redhat.com | https://lists.debian.org/debian-lts-announce/2018/11/msg00010.html | Mailing List, Third Party Advisory | |
secalert@redhat.com | https://support.apple.com/kb/HT212818 | Third Party Advisory | |
secalert@redhat.com | https://usn.ubuntu.com/3812-1/ | Patch, Third Party Advisory | |
secalert@redhat.com | https://www.debian.org/security/2018/dsa-4335 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00035.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://mailman.nginx.org/pipermail/nginx-announce/2018/000221.html | Mailing List, Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2021/Sep/36 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/105868 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1042039 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:3652 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:3653 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:3680 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:3681 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16845 | Issue Tracking, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2018/11/msg00010.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/kb/HT212818 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3812-1/ | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2018/dsa-4335 | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
f5 | nginx | * | |
f5 | nginx | * | |
debian | debian_linux | 8.0 | |
debian | debian_linux | 9.0 | |
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 16.04 | |
canonical | ubuntu_linux | 18.04 | |
canonical | ubuntu_linux | 18.10 | |
opensuse | leap | 15.1 | |
apple | xcode | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*", "matchCriteriaId": "774FF59B-7E9B-4DFE-BDDA-3261321F62A8", "versionEndIncluding": "1.0.15", "versionStartIncluding": "1.0.7", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*", "matchCriteriaId": "72F0096B-D1BF-4F0E-960B-42666438B6FD", "versionEndIncluding": "1.15.5", "versionStartIncluding": "1.1.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "matchCriteriaId": "815D70A8-47D3-459C-A32C-9FEACA0659D1", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*", "matchCriteriaId": "07C312A0-CD2C-4B9C-B064-6409B25C278F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apple:xcode:*:*:*:*:*:*:*:*", "matchCriteriaId": "BB279F6B-EE4C-4885-9CD4-657F6BD2548F", "versionEndExcluding": "13.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "nginx before versions 1.15.6, 1.14.1 has a vulnerability in the ngx_http_mp4_module, which might allow an attacker to cause infinite loop in a worker process, cause a worker process crash, or might result in worker process memory disclosure by using a specially crafted mp4 file. The issue only affects nginx if it is built with the ngx_http_mp4_module (the module is not built by default) and the .mp4. directive is used in the configuration file. Further, the attack is only possible if an attacker is able to trigger processing of a specially crafted mp4 file with the ngx_http_mp4_module." }, { "lang": "es", "value": "nginx en versiones anteriores a la 1.15.6 y 1.14.1 tiene una vulnerabilidad en ngx_http_mp4_module, que podr\u00eda permitir que un atacante provoque un bucle infinito en un proceso worker o resulte en la divulgaci\u00f3n de la memoria del proceso mediante el uso de un archivo mp4 especialmente manipulado. El problema solo afecta a nginx si est\u00e1 incluido con ngx_http_mp4_module (el m\u00f3dulo no est\u00e1 incluido por defecto) y se emplea la directiva .mp4 en el archivo de configuraci\u00f3n. Adem\u00e1s, el atacante solo es posible si un atacante puede desencadenar el procesado de un archivo mp4 especialmente manipulado con ngx_http_mp4_module." } ], "id": "CVE-2018-16845", "lastModified": "2024-11-21T03:53:25.953", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 4.2, "source": "secalert@redhat.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 4.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-11-07T14:29:00.883", "references": [ { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00035.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Patch", "Vendor Advisory" ], "url": "http://mailman.nginx.org/pipermail/nginx-announce/2018/000221.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/Sep/36" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/105868" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1042039" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:3652" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:3653" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:3680" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:3681" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16845" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00010.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT212818" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3812-1/" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2018/dsa-4335" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00035.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Patch", "Vendor Advisory" ], "url": "http://mailman.nginx.org/pipermail/nginx-announce/2018/000221.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/Sep/36" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/105868" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1042039" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:3652" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:3653" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:3680" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:3681" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16845" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00010.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT212818" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3812-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2018/dsa-4335" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-400" } ], "source": "secalert@redhat.com", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-835" } ], "source": "nvd@nist.gov", "type": "Secondary" } ] }
gsd-2018-16845
Vulnerability from gsd
Modified
2023-12-13 01:22
Details
nginx before versions 1.15.6, 1.14.1 has a vulnerability in the ngx_http_mp4_module, which might allow an attacker to cause infinite loop in a worker process, cause a worker process crash, or might result in worker process memory disclosure by using a specially crafted mp4 file. The issue only affects nginx if it is built with the ngx_http_mp4_module (the module is not built by default) and the .mp4. directive is used in the configuration file. Further, the attack is only possible if an attacker is able to trigger processing of a specially crafted mp4 file with the ngx_http_mp4_module.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2018-16845", "description": "nginx before versions 1.15.6, 1.14.1 has a vulnerability in the ngx_http_mp4_module, which might allow an attacker to cause infinite loop in a worker process, cause a worker process crash, or might result in worker process memory disclosure by using a specially crafted mp4 file. The issue only affects nginx if it is built with the ngx_http_mp4_module (the module is not built by default) and the .mp4. directive is used in the configuration file. Further, the attack is only possible if an attacker is able to trigger processing of a specially crafted mp4 file with the ngx_http_mp4_module.", "id": "GSD-2018-16845", "references": [ "https://www.suse.com/security/cve/CVE-2018-16845.html", "https://www.debian.org/security/2018/dsa-4335", "https://access.redhat.com/errata/RHSA-2018:3681", "https://access.redhat.com/errata/RHSA-2018:3680", "https://access.redhat.com/errata/RHSA-2018:3653", "https://access.redhat.com/errata/RHSA-2018:3652", "https://ubuntu.com/security/CVE-2018-16845", "https://advisories.mageia.org/CVE-2018-16845.html", "https://linux.oracle.com/cve/CVE-2018-16845.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2018-16845" ], "details": "nginx before versions 1.15.6, 1.14.1 has a vulnerability in the ngx_http_mp4_module, which might allow an attacker to cause infinite loop in a worker process, cause a worker process crash, or might result in worker process memory disclosure by using a specially crafted mp4 file. The issue only affects nginx if it is built with the ngx_http_mp4_module (the module is not built by default) and the .mp4. directive is used in the configuration file. Further, the attack is only possible if an attacker is able to trigger processing of a specially crafted mp4 file with the ngx_http_mp4_module.", "id": "GSD-2018-16845", "modified": "2023-12-13T01:22:26.415303Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2018-16845", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "nginx", "version": { "version_data": [ { "version_value": "1.15.6" }, { "version_value": "1.14.1" } ] } } ] }, "vendor_name": "[UNKNOWN]" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "nginx before versions 1.15.6, 1.14.1 has a vulnerability in the ngx_http_mp4_module, which might allow an attacker to cause infinite loop in a worker process, cause a worker process crash, or might result in worker process memory disclosure by using a specially crafted mp4 file. The issue only affects nginx if it is built with the ngx_http_mp4_module (the module is not built by default) and the .mp4. directive is used in the configuration file. Further, the attack is only possible if an attacker is able to trigger processing of a specially crafted mp4 file with the ngx_http_mp4_module." } ] }, "impact": { "cvss": [ [ { "vectorString": "8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.0" } ] ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-400" } ] } ] }, "references": { "reference_data": [ { "name": "DSA-4335", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4335" }, { "name": "RHSA-2018:3680", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:3680" }, { "name": "RHSA-2018:3681", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:3681" }, { "name": "105868", "refsource": "BID", "url": "http://www.securityfocus.com/bid/105868" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16845", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16845" }, { "name": "1042039", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1042039" }, { "name": "[debian-lts-announce] 20181108 [SECURITY] [DLA 1572-1] nginx security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00010.html" }, { "name": "RHSA-2018:3653", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:3653" }, { "name": "RHSA-2018:3652", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:3652" }, { "name": "USN-3812-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3812-1/" }, { "name": "http://mailman.nginx.org/pipermail/nginx-announce/2018/000221.html", "refsource": "MISC", "url": "http://mailman.nginx.org/pipermail/nginx-announce/2018/000221.html" }, { "name": "openSUSE-SU-2019:2120", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00035.html" }, { "name": "https://support.apple.com/kb/HT212818", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT212818" }, { "name": "20210921 APPLE-SA-2021-09-20-4 Xcode 13", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/Sep/36" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.0.15", "versionStartIncluding": "1.0.7", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.15.5", "versionStartIncluding": "1.1.3", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:apple:xcode:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "13.0", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2018-16845" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "nginx before versions 1.15.6, 1.14.1 has a vulnerability in the ngx_http_mp4_module, which might allow an attacker to cause infinite loop in a worker process, cause a worker process crash, or might result in worker process memory disclosure by using a specially crafted mp4 file. The issue only affects nginx if it is built with the ngx_http_mp4_module (the module is not built by default) and the .mp4. directive is used in the configuration file. Further, the attack is only possible if an attacker is able to trigger processing of a specially crafted mp4 file with the ngx_http_mp4_module." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-400" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16845", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16845" }, { "name": "http://mailman.nginx.org/pipermail/nginx-announce/2018/000221.html", "refsource": "MISC", "tags": [ "Mailing List", "Patch", "Vendor Advisory" ], "url": "http://mailman.nginx.org/pipermail/nginx-announce/2018/000221.html" }, { "name": "USN-3812-1", "refsource": "UBUNTU", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3812-1/" }, { "name": "1042039", "refsource": "SECTRACK", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1042039" }, { "name": "DSA-4335", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2018/dsa-4335" }, { "name": "[debian-lts-announce] 20181108 [SECURITY] [DLA 1572-1] nginx security update", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00010.html" }, { "name": "105868", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/105868" }, { "name": "RHSA-2018:3653", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:3653" }, { "name": "RHSA-2018:3652", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:3652" }, { "name": "RHSA-2018:3681", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:3681" }, { "name": "RHSA-2018:3680", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:3680" }, { "name": "openSUSE-SU-2019:2120", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00035.html" }, { "name": "https://support.apple.com/kb/HT212818", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT212818" }, { "name": "20210921 APPLE-SA-2021-09-20-4 Xcode 13", "refsource": "FULLDISC", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/Sep/36" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": true }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 4.2 } }, "lastModifiedDate": "2022-02-22T19:27Z", "publishedDate": "2018-11-07T14:29Z" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…