Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2019-9517 (GCVE-0-2019-9517)
Vulnerability from cvelistv5
Published
2019-08-13 20:50
Modified
2024-08-04 21:54
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-400 - Uncontrolled Resource Consumption
Summary
Some HTTP/2 implementations are vulnerable to unconstrained interal data buffering, potentially leading to a denial of service. The attacker opens the HTTP/2 window so the peer can send without constraint; however, they leave the TCP window closed so the peer cannot actually write (many of) the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the servers queue the responses, this can consume excess memory, CPU, or both.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T21:54:44.675Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "VU#605641", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "https://kb.cert.org/vuls/id/605641/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "name": "[httpd-announce] 20190814 CVE-2019-9517: mod_http2, DoS attack by exhausting h2 workers", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/4610762456644181b267c846423b3a990bd4aaea1886ecc7d51febdb%40%3Cannounce.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048743 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[oss-security] 20190814 CVE-2019-9517: mod_http2, DoS attack by exhausting h2 workers", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2019/08/15/7" }, { "name": "[httpd-dev] 20190817 CVE-2019-10097 vs. CHANGEs entry", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/ec97fdfc1a859266e56fef084353a34e0a0b08901b3c1aa317a43c8c%40%3Cdev.httpd.apache.org%3E" }, { "name": "[httpd-dev] 20190817 Re: CVE-2019-10097 vs. CHANGEs entry", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/d89f999e26dfb1d50f247ead1fe8538014eb412b2dbe5be4b1a9ef50%40%3Cdev.httpd.apache.org%3E" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.synology.com/security/advisory/Synology_SA_19_33" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.f5.com/csp/article/K02591030" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20190823-0005/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20190823-0003/" }, { "name": "FEDORA-2019-5a6a7bc12c", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP/" }, { "name": "FEDORA-2019-6a2980de56", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC/" }, { "name": "DSA-4509", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2019/dsa-4509" }, { "name": "20190826 [SECURITY] [DSA 4509-1] apache2 security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2019/Aug/47" }, { "name": "USN-4113-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4113-1/" }, { "name": "FEDORA-2019-4427fd65be", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BP556LEG3WENHZI5TAQ6ZEBFTJB4E2IS/" }, { "name": "FEDORA-2019-63ba15cc83", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XHTKU7YQ5EEP2XNSAV4M4VJ7QCBOJMOD/" }, { "name": "openSUSE-SU-2019:2051", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00004.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20190905-0003/" }, { "name": "GLSA-201909-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201909-04" }, { "name": "openSUSE-SU-2019:2114", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html" }, { "name": "openSUSE-SU-2019:2115", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10296" }, { "name": "RHSA-2019:2893", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:2893" }, { "name": "RHSA-2019:2925", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:2925" }, { "name": "RHSA-2019:2939", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:2939" }, { "name": "RHSA-2019:2946", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:2946" }, { "name": "RHSA-2019:2950", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:2950" }, { "name": "RHSA-2019:2949", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:2949" }, { "name": "RHSA-2019:2955", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:2955" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.f5.com/csp/article/K02591030?utm_source=f5support\u0026amp%3Butm_medium=RSS" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html" }, { "name": "RHSA-2019:3933", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:3933" }, { "name": "RHSA-2019:3935", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:3935" }, { "name": "RHSA-2019:3932", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:3932" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058586 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073149 [13/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210606 svn commit: r1075470 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "credits": [ { "lang": "en", "value": "Thanks to Jonathan Looney of Netflix for reporting this vulnerability." } ], "descriptions": [ { "lang": "en", "value": "Some HTTP/2 implementations are vulnerable to unconstrained interal data buffering, potentially leading to a denial of service. The attacker opens the HTTP/2 window so the peer can send without constraint; however, they leave the TCP window closed so the peer cannot actually write (many of) the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the servers queue the responses, this can consume excess memory, CPU, or both." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400 Uncontrolled Resource Consumption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-06T10:10:48", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "name": "VU#605641", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "https://kb.cert.org/vuls/id/605641/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "name": "[httpd-announce] 20190814 CVE-2019-9517: mod_http2, DoS attack by exhausting h2 workers", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/4610762456644181b267c846423b3a990bd4aaea1886ecc7d51febdb%40%3Cannounce.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048743 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[oss-security] 20190814 CVE-2019-9517: mod_http2, DoS attack by exhausting h2 workers", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2019/08/15/7" }, { "name": "[httpd-dev] 20190817 CVE-2019-10097 vs. CHANGEs entry", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/ec97fdfc1a859266e56fef084353a34e0a0b08901b3c1aa317a43c8c%40%3Cdev.httpd.apache.org%3E" }, { "name": "[httpd-dev] 20190817 Re: CVE-2019-10097 vs. CHANGEs entry", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/d89f999e26dfb1d50f247ead1fe8538014eb412b2dbe5be4b1a9ef50%40%3Cdev.httpd.apache.org%3E" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.synology.com/security/advisory/Synology_SA_19_33" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.f5.com/csp/article/K02591030" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20190823-0005/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20190823-0003/" }, { "name": "FEDORA-2019-5a6a7bc12c", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP/" }, { "name": "FEDORA-2019-6a2980de56", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC/" }, { "name": "DSA-4509", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2019/dsa-4509" }, { "name": "20190826 [SECURITY] [DSA 4509-1] apache2 security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2019/Aug/47" }, { "name": "USN-4113-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4113-1/" }, { "name": "FEDORA-2019-4427fd65be", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BP556LEG3WENHZI5TAQ6ZEBFTJB4E2IS/" }, { "name": "FEDORA-2019-63ba15cc83", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XHTKU7YQ5EEP2XNSAV4M4VJ7QCBOJMOD/" }, { "name": "openSUSE-SU-2019:2051", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00004.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20190905-0003/" }, { "name": "GLSA-201909-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201909-04" }, { "name": "openSUSE-SU-2019:2114", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html" }, { "name": "openSUSE-SU-2019:2115", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10296" }, { "name": "RHSA-2019:2893", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:2893" }, { "name": "RHSA-2019:2925", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:2925" }, { "name": "RHSA-2019:2939", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:2939" }, { "name": "RHSA-2019:2946", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:2946" }, { "name": "RHSA-2019:2950", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:2950" }, { "name": "RHSA-2019:2949", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:2949" }, { "name": "RHSA-2019:2955", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:2955" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.f5.com/csp/article/K02591030?utm_source=f5support\u0026amp%3Butm_medium=RSS" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html" }, { "name": "RHSA-2019:3933", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:3933" }, { "name": "RHSA-2019:3935", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:3935" }, { "name": "RHSA-2019:3932", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:3932" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058586 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073149 [13/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210606 svn commit: r1075470 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E" } ], "source": { "discovery": "UNKNOWN" }, "title": "Some HTTP/2 implementations are vulnerable to unconstrained interal data buffering, potentially leading to a denial of service", "x_generator": { "engine": "Vulnogram 0.0.7" }, "x_legacyV4Record": { "CVE_data_meta": { "AKA": "HTTP/2 Internal Data Buffering", "ASSIGNER": "cert@cert.org", "ID": "CVE-2019-9517", "STATE": "PUBLIC", "TITLE": "Some HTTP/2 implementations are vulnerable to unconstrained interal data buffering, potentially leading to a denial of service" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "credit": [ { "lang": "eng", "value": "Thanks to Jonathan Looney of Netflix for reporting this vulnerability." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Some HTTP/2 implementations are vulnerable to unconstrained interal data buffering, potentially leading to a denial of service. The attacker opens the HTTP/2 window so the peer can send without constraint; however, they leave the TCP window closed so the peer cannot actually write (many of) the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the servers queue the responses, this can consume excess memory, CPU, or both." } ] }, "generator": { "engine": "Vulnogram 0.0.7" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-400 Uncontrolled Resource Consumption" } ] } ] }, "references": { "reference_data": [ { "name": "VU#605641", "refsource": "CERT-VN", "url": "https://kb.cert.org/vuls/id/605641/" }, { "name": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "refsource": "MISC", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "name": "[httpd-announce] 20190814 CVE-2019-9517: mod_http2, DoS attack by exhausting h2 workers", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/4610762456644181b267c846423b3a990bd4aaea1886ecc7d51febdb@%3Cannounce.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048743 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E" }, { "name": "[oss-security] 20190814 CVE-2019-9517: mod_http2, DoS attack by exhausting h2 workers", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2019/08/15/7" }, { "name": "[httpd-dev] 20190817 CVE-2019-10097 vs. CHANGEs entry", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/ec97fdfc1a859266e56fef084353a34e0a0b08901b3c1aa317a43c8c@%3Cdev.httpd.apache.org%3E" }, { "name": "[httpd-dev] 20190817 Re: CVE-2019-10097 vs. CHANGEs entry", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/d89f999e26dfb1d50f247ead1fe8538014eb412b2dbe5be4b1a9ef50@%3Cdev.httpd.apache.org%3E" }, { "name": "https://www.synology.com/security/advisory/Synology_SA_19_33", "refsource": "CONFIRM", "url": "https://www.synology.com/security/advisory/Synology_SA_19_33" }, { "name": "https://support.f5.com/csp/article/K02591030", "refsource": "CONFIRM", "url": "https://support.f5.com/csp/article/K02591030" }, { "name": "https://security.netapp.com/advisory/ntap-20190823-0005/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20190823-0005/" }, { "name": "https://security.netapp.com/advisory/ntap-20190823-0003/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20190823-0003/" }, { "name": "FEDORA-2019-5a6a7bc12c", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP/" }, { "name": "FEDORA-2019-6a2980de56", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC/" }, { "name": "DSA-4509", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2019/dsa-4509" }, { "name": "20190826 [SECURITY] [DSA 4509-1] apache2 security update", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2019/Aug/47" }, { "name": "USN-4113-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4113-1/" }, { "name": "FEDORA-2019-4427fd65be", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BP556LEG3WENHZI5TAQ6ZEBFTJB4E2IS/" }, { "name": "FEDORA-2019-63ba15cc83", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XHTKU7YQ5EEP2XNSAV4M4VJ7QCBOJMOD/" }, { "name": "openSUSE-SU-2019:2051", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00004.html" }, { "name": "https://security.netapp.com/advisory/ntap-20190905-0003/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20190905-0003/" }, { "name": "GLSA-201909-04", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201909-04" }, { "name": "openSUSE-SU-2019:2114", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html" }, { "name": "openSUSE-SU-2019:2115", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html" }, { "name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10296", "refsource": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10296" }, { "name": "RHSA-2019:2893", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:2893" }, { "name": "RHSA-2019:2925", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:2925" }, { "name": "RHSA-2019:2939", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:2939" }, { "name": "RHSA-2019:2946", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:2946" }, { "name": "RHSA-2019:2950", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:2950" }, { "name": "RHSA-2019:2949", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:2949" }, { "name": "RHSA-2019:2955", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:2955" }, { "name": "https://support.f5.com/csp/article/K02591030?utm_source=f5support\u0026amp;utm_medium=RSS", "refsource": "CONFIRM", "url": "https://support.f5.com/csp/article/K02591030?utm_source=f5support\u0026amp;utm_medium=RSS" }, { "name": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html", "refsource": "MISC", "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html" }, { "name": "RHSA-2019:3933", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:3933" }, { "name": "RHSA-2019:3935", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:3935" }, { "name": "RHSA-2019:3932", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:3932" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058586 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E" }, { "name": "https://www.oracle.com/security-alerts/cpuapr2020.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073149 [13/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210606 svn commit: r1075470 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2019-9517", "datePublished": "2019-08-13T20:50:59", "dateReserved": "2019-03-01T00:00:00", "dateUpdated": "2024-08-04T21:54:44.675Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2019-9517\",\"sourceIdentifier\":\"cret@cert.org\",\"published\":\"2019-08-13T21:15:12.647\",\"lastModified\":\"2025-01-14T19:29:55.853\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Some HTTP/2 implementations are vulnerable to unconstrained interal data buffering, potentially leading to a denial of service. The attacker opens the HTTP/2 window so the peer can send without constraint; however, they leave the TCP window closed so the peer cannot actually write (many of) the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the servers queue the responses, this can consume excess memory, CPU, or both.\"},{\"lang\":\"es\",\"value\":\"Algunas implementaciones HTTP / 2 son vulnerables al almacenamiento en b\u00fafer de datos interal sin restricciones, lo que puede conducir a una denegaci\u00f3n de servicio. El atacante abre la ventana HTTP / 2 para que el par pueda enviar sin restricciones; sin embargo, dejan la ventana TCP cerrada para que el igual no pueda escribir (muchos de) los bytes en el cable. El atacante luego env\u00eda una secuencia de solicitudes para un objeto de respuesta grande. Dependiendo de c\u00f3mo los servidores ponen en cola las respuestas, esto puede consumir un exceso de memoria, CPU o ambos.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV30\":[{\"source\":\"cret@cert.org\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:C\",\"baseScore\":7.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"cret@cert.org\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-400\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-770\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:swiftnio:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0.0\",\"versionEndIncluding\":\"1.4.0\",\"matchCriteriaId\":\"93988E60-006B-434D-AB16-1FA1D2FEBC2A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.12\",\"matchCriteriaId\":\"1D294D56-E784-4DA8-9C2C-BC5A05C92C0C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"14.04\",\"matchCriteriaId\":\"65B1D2F6-BC1F-47AF-B4E6-4B50986AC622\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.4.20\",\"versionEndExcluding\":\"2.4.40\",\"matchCriteriaId\":\"EAC639E9-54EB-4EBD-A444-30B2E068EC9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.0.0\",\"versionEndIncluding\":\"6.2.3\",\"matchCriteriaId\":\"603BF43B-FC99-4039-A3C0-467F015A32FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"7.0.0\",\"versionEndIncluding\":\"7.1.6\",\"matchCriteriaId\":\"07BB02CE-D4F2-459C-B0C6-FF78BF7996AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"8.0.0\",\"versionEndIncluding\":\"8.0.3\",\"matchCriteriaId\":\"D875E0D8-D109-4F7F-A4C4-9EDD66CEE74E\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD783B0C-9246-47D9-A937-6144FE8BFF0F\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:synology:skynas:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C997777-BE79-4F77-90D7-E1A71D474D88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:synology:diskstation_manager:6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9685B12-824F-42AD-B87C-6E7A78BB7FA5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:synology:vs960hd_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D0C5120-B961-440F-B454-584BC54B549C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:synology:vs960hd:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CCBDFF9-AF42-4681-879B-CF789EBAD130\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D100F7CE-FC64-4CC6-852A-6136D72DA419\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97A4B8DF-58DA-4AB6-A1F9-331B36409BA3\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1E78106-58E6-4D59-990F-75DA575BFAD9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B620311B-34A3-48A6-82DF-6F078D7A4493\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:jboss_core_services:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2466282-51AB-478D-9FF4-FA524265ED2E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0952BA1A-5DF9-400F-B01F-C3A398A8A2D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B157A2D-3422-4224-82D9-15AB3B989075\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openshift_service_mesh:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"732F14CE-7994-4DD2-A28B-AE9E79826C01\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1987BDA-0113-4603-B9BE-76647EB043F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:software_collections:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D7EE4B6-A6EC-4B9B-91DF-79615796673F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4CFF558-3C47-480D-A2F0-BABF26042943\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_element_manager:8.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED5503EC-63B6-47EB-AE37-14DD317DDDD8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_element_manager:8.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A99F85F8-F374-48B0-9534-BB9C07AFE76E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_element_manager:8.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C57FD3A-0CC1-4BA9-879A-8C4A40234162\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_element_manager:8.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"698FB6D0-B26F-4760-9B9B-1C65FBFF2126\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:graalvm:19.2.0:*:*:*:enterprise:*:*:*\",\"matchCriteriaId\":\"C120C2F1-D50D-49CC-8E96-207ACCA49674\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:instantis_enterprisetrack:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"17.1\",\"versionEndIncluding\":\"17.3\",\"matchCriteriaId\":\"9A74FD5F-4FEA-4A74-8B92-72DFDE6BA464\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:retail_xstore_point_of_service:7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0ED83E3-E6BF-4EAA-AF8F-33485A88A218\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"7.7.2.0\",\"versionEndExcluding\":\"7.7.2.24\",\"matchCriteriaId\":\"765E9856-2748-4A8B-91F5-A4DB3C8C547A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"7.8.2.0\",\"versionEndExcluding\":\"7.8.2.13\",\"matchCriteriaId\":\"EE6E66B1-3291-4E8E-93D6-30E9FDCF983E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"8.1.0\",\"versionEndExcluding\":\"8.2.0\",\"matchCriteriaId\":\"227104AD-396D-4ADD-87C7-C4CD5583DA04\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FE996B1-6951-4F85-AA58-B99A379D2163\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*\",\"versionStartIncluding\":\"8.0.0\",\"versionEndIncluding\":\"8.8.1\",\"matchCriteriaId\":\"74FB695D-2C76-47AB-988E-5629D2E695E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*\",\"versionStartIncluding\":\"8.9.0\",\"versionEndExcluding\":\"8.16.1\",\"matchCriteriaId\":\"CFC0252A-DF1D-4CF4-B450-27267227B599\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*\",\"versionStartIncluding\":\"10.0.0\",\"versionEndIncluding\":\"10.12.0\",\"matchCriteriaId\":\"25A3180B-21AF-4010-9DAB-41ADFD2D8031\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*\",\"versionStartIncluding\":\"10.13.0\",\"versionEndExcluding\":\"10.16.3\",\"matchCriteriaId\":\"2EC65858-FF7B-4171-82EA-80942D426F40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*\",\"versionStartIncluding\":\"12.0.0\",\"versionEndExcluding\":\"12.8.1\",\"matchCriteriaId\":\"F522C500-AA33-4029-865F-F27FB00A354E\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00004.html\",\"source\":\"cret@cert.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html\",\"source\":\"cret@cert.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html\",\"source\":\"cret@cert.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2019/08/15/7\",\"source\":\"cret@cert.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2893\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2925\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2939\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2946\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2949\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2950\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2955\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:3932\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:3933\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:3935\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://kb.cert.org/vuls/id/605641/\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10296\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.apache.org/thread.html/4610762456644181b267c846423b3a990bd4aaea1886ecc7d51febdb%40%3Cannounce.httpd.apache.org%3E\",\"source\":\"cret@cert.org\"},{\"url\":\"https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"cret@cert.org\"},{\"url\":\"https://lists.apache.org/thread.html/d89f999e26dfb1d50f247ead1fe8538014eb412b2dbe5be4b1a9ef50%40%3Cdev.httpd.apache.org%3E\",\"source\":\"cret@cert.org\"},{\"url\":\"https://lists.apache.org/thread.html/ec97fdfc1a859266e56fef084353a34e0a0b08901b3c1aa317a43c8c%40%3Cdev.httpd.apache.org%3E\",\"source\":\"cret@cert.org\"},{\"url\":\"https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"cret@cert.org\"},{\"url\":\"https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"cret@cert.org\"},{\"url\":\"https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"cret@cert.org\"},{\"url\":\"https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"cret@cert.org\"},{\"url\":\"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"cret@cert.org\"},{\"url\":\"https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"cret@cert.org\"},{\"url\":\"https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"cret@cert.org\"},{\"url\":\"https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"cret@cert.org\"},{\"url\":\"https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"cret@cert.org\"},{\"url\":\"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"cret@cert.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC/\",\"source\":\"cret@cert.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BP556LEG3WENHZI5TAQ6ZEBFTJB4E2IS/\",\"source\":\"cret@cert.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP/\",\"source\":\"cret@cert.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XHTKU7YQ5EEP2XNSAV4M4VJ7QCBOJMOD/\",\"source\":\"cret@cert.org\"},{\"url\":\"https://seclists.org/bugtraq/2019/Aug/47\",\"source\":\"cret@cert.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201909-04\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20190823-0003/\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20190823-0005/\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20190905-0003/\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.f5.com/csp/article/K02591030\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.f5.com/csp/article/K02591030?utm_source=f5support\u0026amp%3Butm_medium=RSS\",\"source\":\"cret@cert.org\"},{\"url\":\"https://usn.ubuntu.com/4113-1/\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2019/dsa-4509\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpuapr2020.html\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html\",\"source\":\"cret@cert.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.synology.com/security/advisory/Synology_SA_19_33\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00004.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2019/08/15/7\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2893\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2925\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2939\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2946\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2949\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2950\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2955\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:3932\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:3933\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:3935\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://kb.cert.org/vuls/id/605641/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10296\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.apache.org/thread.html/4610762456644181b267c846423b3a990bd4aaea1886ecc7d51febdb%40%3Cannounce.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/d89f999e26dfb1d50f247ead1fe8538014eb412b2dbe5be4b1a9ef50%40%3Cdev.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/ec97fdfc1a859266e56fef084353a34e0a0b08901b3c1aa317a43c8c%40%3Cdev.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BP556LEG3WENHZI5TAQ6ZEBFTJB4E2IS/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XHTKU7YQ5EEP2XNSAV4M4VJ7QCBOJMOD/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://seclists.org/bugtraq/2019/Aug/47\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201909-04\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20190823-0003/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20190823-0005/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20190905-0003/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.f5.com/csp/article/K02591030\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.f5.com/csp/article/K02591030?utm_source=f5support\u0026amp%3Butm_medium=RSS\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://usn.ubuntu.com/4113-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2019/dsa-4509\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpuapr2020.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.synology.com/security/advisory/Synology_SA_19_33\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
suse-su-2019:2329-1
Vulnerability from csaf_suse
Published
2019-09-06 14:08
Modified
2019-09-06 14:08
Summary
Security update for apache2
Notes
Title of the patch
Security update for apache2
Description of the patch
This update for apache2 fixes the following issues:
Security issues fixed:
- CVE-2019-9517: Fixed HTTP/2 implementations that are vulnerable to unconstrained interal data buffering (bsc#1145575).
- CVE-2019-10081: Fixed mod_http2 that is vulnerable to memory corruption on early pushes (bsc#1145742).
- CVE-2019-10082: Fixed mod_http2 that is vulnerable to read-after-free in h2 connection shutdown (bsc#1145741).
- CVE-2019-10092: Fixed limited cross-site scripting in mod_proxy (bsc#1145740).
- CVE-2019-10098: Fixed mod_rewrite configuration vulnerablility to open redirect (bsc#1145738).
Patchnames
SUSE-2019-2329,SUSE-SLE-SDK-12-SP4-2019-2329,SUSE-SLE-SERVER-12-SP4-2019-2329
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for apache2", "title": "Title of the patch" }, { "category": "description", "text": "This update for apache2 fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2019-9517: Fixed HTTP/2 implementations that are vulnerable to unconstrained interal data buffering (bsc#1145575).\n- CVE-2019-10081: Fixed mod_http2 that is vulnerable to memory corruption on early pushes (bsc#1145742).\n- CVE-2019-10082: Fixed mod_http2 that is vulnerable to read-after-free in h2 connection shutdown (bsc#1145741).\n- CVE-2019-10092: Fixed limited cross-site scripting in mod_proxy (bsc#1145740).\n- CVE-2019-10098: Fixed mod_rewrite configuration vulnerablility to open redirect (bsc#1145738).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2019-2329,SUSE-SLE-SDK-12-SP4-2019-2329,SUSE-SLE-SERVER-12-SP4-2019-2329", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_2329-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:2329-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192329-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:2329-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2019-September/005889.html" }, { "category": "self", "summary": "SUSE Bug 1145575", "url": "https://bugzilla.suse.com/1145575" }, { "category": "self", "summary": "SUSE Bug 1145738", "url": "https://bugzilla.suse.com/1145738" }, { "category": "self", "summary": "SUSE Bug 1145740", "url": "https://bugzilla.suse.com/1145740" }, { "category": "self", "summary": "SUSE Bug 1145741", "url": "https://bugzilla.suse.com/1145741" }, { "category": "self", "summary": "SUSE Bug 1145742", "url": "https://bugzilla.suse.com/1145742" }, { "category": "self", "summary": "SUSE CVE CVE-2019-10081 page", "url": "https://www.suse.com/security/cve/CVE-2019-10081/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-10082 page", "url": "https://www.suse.com/security/cve/CVE-2019-10082/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-10092 page", "url": "https://www.suse.com/security/cve/CVE-2019-10092/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-10098 page", "url": "https://www.suse.com/security/cve/CVE-2019-10098/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9517 page", "url": "https://www.suse.com/security/cve/CVE-2019-9517/" } ], "title": "Security update for apache2", "tracking": { "current_release_date": "2019-09-06T14:08:14Z", "generator": { "date": "2019-09-06T14:08:14Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:2329-1", "initial_release_date": "2019-09-06T14:08:14Z", "revision_history": [ { "date": "2019-09-06T14:08:14Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "apache2-2.4.23-29.43.1.aarch64", "product": { "name": "apache2-2.4.23-29.43.1.aarch64", "product_id": "apache2-2.4.23-29.43.1.aarch64" } }, { "category": "product_version", "name": "apache2-devel-2.4.23-29.43.1.aarch64", "product": { "name": "apache2-devel-2.4.23-29.43.1.aarch64", "product_id": "apache2-devel-2.4.23-29.43.1.aarch64" } }, { "category": "product_version", "name": "apache2-event-2.4.23-29.43.1.aarch64", "product": { "name": "apache2-event-2.4.23-29.43.1.aarch64", "product_id": "apache2-event-2.4.23-29.43.1.aarch64" } }, { "category": "product_version", "name": "apache2-example-pages-2.4.23-29.43.1.aarch64", "product": { "name": "apache2-example-pages-2.4.23-29.43.1.aarch64", "product_id": "apache2-example-pages-2.4.23-29.43.1.aarch64" } }, { "category": "product_version", "name": "apache2-prefork-2.4.23-29.43.1.aarch64", "product": { "name": "apache2-prefork-2.4.23-29.43.1.aarch64", "product_id": "apache2-prefork-2.4.23-29.43.1.aarch64" } }, { "category": "product_version", "name": "apache2-utils-2.4.23-29.43.1.aarch64", "product": { "name": "apache2-utils-2.4.23-29.43.1.aarch64", "product_id": "apache2-utils-2.4.23-29.43.1.aarch64" } }, { "category": "product_version", "name": "apache2-worker-2.4.23-29.43.1.aarch64", "product": { "name": "apache2-worker-2.4.23-29.43.1.aarch64", "product_id": "apache2-worker-2.4.23-29.43.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "apache2-2.4.23-29.43.1.i586", "product": { "name": "apache2-2.4.23-29.43.1.i586", "product_id": "apache2-2.4.23-29.43.1.i586" } }, { "category": "product_version", "name": "apache2-devel-2.4.23-29.43.1.i586", "product": { "name": "apache2-devel-2.4.23-29.43.1.i586", "product_id": "apache2-devel-2.4.23-29.43.1.i586" } }, { "category": "product_version", "name": "apache2-event-2.4.23-29.43.1.i586", "product": { "name": "apache2-event-2.4.23-29.43.1.i586", "product_id": "apache2-event-2.4.23-29.43.1.i586" } }, { "category": "product_version", "name": "apache2-example-pages-2.4.23-29.43.1.i586", "product": { "name": "apache2-example-pages-2.4.23-29.43.1.i586", "product_id": "apache2-example-pages-2.4.23-29.43.1.i586" } }, { "category": "product_version", "name": "apache2-prefork-2.4.23-29.43.1.i586", "product": { "name": "apache2-prefork-2.4.23-29.43.1.i586", "product_id": "apache2-prefork-2.4.23-29.43.1.i586" } }, { "category": "product_version", "name": "apache2-utils-2.4.23-29.43.1.i586", "product": { "name": "apache2-utils-2.4.23-29.43.1.i586", "product_id": "apache2-utils-2.4.23-29.43.1.i586" } }, { "category": "product_version", "name": "apache2-worker-2.4.23-29.43.1.i586", "product": { "name": "apache2-worker-2.4.23-29.43.1.i586", "product_id": "apache2-worker-2.4.23-29.43.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "apache2-doc-2.4.23-29.43.1.noarch", "product": { "name": "apache2-doc-2.4.23-29.43.1.noarch", "product_id": "apache2-doc-2.4.23-29.43.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "apache2-2.4.23-29.43.1.ppc64le", "product": { "name": "apache2-2.4.23-29.43.1.ppc64le", "product_id": "apache2-2.4.23-29.43.1.ppc64le" } }, { "category": "product_version", "name": "apache2-devel-2.4.23-29.43.1.ppc64le", "product": { "name": "apache2-devel-2.4.23-29.43.1.ppc64le", "product_id": "apache2-devel-2.4.23-29.43.1.ppc64le" } }, { "category": "product_version", "name": "apache2-event-2.4.23-29.43.1.ppc64le", "product": { "name": "apache2-event-2.4.23-29.43.1.ppc64le", "product_id": "apache2-event-2.4.23-29.43.1.ppc64le" } }, { "category": "product_version", "name": "apache2-example-pages-2.4.23-29.43.1.ppc64le", "product": { "name": "apache2-example-pages-2.4.23-29.43.1.ppc64le", "product_id": "apache2-example-pages-2.4.23-29.43.1.ppc64le" } }, { "category": "product_version", "name": "apache2-prefork-2.4.23-29.43.1.ppc64le", "product": { "name": "apache2-prefork-2.4.23-29.43.1.ppc64le", "product_id": "apache2-prefork-2.4.23-29.43.1.ppc64le" } }, { "category": "product_version", "name": "apache2-utils-2.4.23-29.43.1.ppc64le", "product": { "name": "apache2-utils-2.4.23-29.43.1.ppc64le", "product_id": "apache2-utils-2.4.23-29.43.1.ppc64le" } }, { "category": "product_version", "name": "apache2-worker-2.4.23-29.43.1.ppc64le", "product": { "name": "apache2-worker-2.4.23-29.43.1.ppc64le", "product_id": "apache2-worker-2.4.23-29.43.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "apache2-2.4.23-29.43.1.s390", "product": { "name": "apache2-2.4.23-29.43.1.s390", "product_id": "apache2-2.4.23-29.43.1.s390" } }, { "category": "product_version", "name": "apache2-devel-2.4.23-29.43.1.s390", "product": { "name": "apache2-devel-2.4.23-29.43.1.s390", "product_id": "apache2-devel-2.4.23-29.43.1.s390" } }, { "category": "product_version", "name": "apache2-event-2.4.23-29.43.1.s390", "product": { "name": "apache2-event-2.4.23-29.43.1.s390", "product_id": "apache2-event-2.4.23-29.43.1.s390" } }, { "category": "product_version", "name": "apache2-example-pages-2.4.23-29.43.1.s390", "product": { "name": "apache2-example-pages-2.4.23-29.43.1.s390", "product_id": "apache2-example-pages-2.4.23-29.43.1.s390" } }, { "category": "product_version", "name": "apache2-prefork-2.4.23-29.43.1.s390", "product": { "name": "apache2-prefork-2.4.23-29.43.1.s390", "product_id": "apache2-prefork-2.4.23-29.43.1.s390" } }, { "category": "product_version", "name": "apache2-utils-2.4.23-29.43.1.s390", "product": { "name": "apache2-utils-2.4.23-29.43.1.s390", "product_id": "apache2-utils-2.4.23-29.43.1.s390" } }, { "category": "product_version", "name": "apache2-worker-2.4.23-29.43.1.s390", "product": { "name": "apache2-worker-2.4.23-29.43.1.s390", "product_id": "apache2-worker-2.4.23-29.43.1.s390" } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "apache2-2.4.23-29.43.1.s390x", "product": { "name": "apache2-2.4.23-29.43.1.s390x", "product_id": "apache2-2.4.23-29.43.1.s390x" } }, { "category": "product_version", "name": "apache2-devel-2.4.23-29.43.1.s390x", "product": { "name": "apache2-devel-2.4.23-29.43.1.s390x", "product_id": "apache2-devel-2.4.23-29.43.1.s390x" } }, { "category": "product_version", "name": "apache2-event-2.4.23-29.43.1.s390x", "product": { "name": "apache2-event-2.4.23-29.43.1.s390x", "product_id": "apache2-event-2.4.23-29.43.1.s390x" } }, { "category": "product_version", "name": "apache2-example-pages-2.4.23-29.43.1.s390x", "product": { "name": "apache2-example-pages-2.4.23-29.43.1.s390x", "product_id": "apache2-example-pages-2.4.23-29.43.1.s390x" } }, { "category": "product_version", "name": "apache2-prefork-2.4.23-29.43.1.s390x", "product": { "name": "apache2-prefork-2.4.23-29.43.1.s390x", "product_id": "apache2-prefork-2.4.23-29.43.1.s390x" } }, { "category": "product_version", "name": "apache2-utils-2.4.23-29.43.1.s390x", "product": { "name": "apache2-utils-2.4.23-29.43.1.s390x", "product_id": "apache2-utils-2.4.23-29.43.1.s390x" } }, { "category": "product_version", "name": "apache2-worker-2.4.23-29.43.1.s390x", "product": { "name": "apache2-worker-2.4.23-29.43.1.s390x", "product_id": "apache2-worker-2.4.23-29.43.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "apache2-2.4.23-29.43.1.x86_64", "product": { "name": "apache2-2.4.23-29.43.1.x86_64", "product_id": "apache2-2.4.23-29.43.1.x86_64" } }, { "category": "product_version", "name": "apache2-devel-2.4.23-29.43.1.x86_64", "product": { "name": "apache2-devel-2.4.23-29.43.1.x86_64", "product_id": "apache2-devel-2.4.23-29.43.1.x86_64" } }, { "category": "product_version", "name": "apache2-event-2.4.23-29.43.1.x86_64", "product": { "name": "apache2-event-2.4.23-29.43.1.x86_64", "product_id": "apache2-event-2.4.23-29.43.1.x86_64" } }, { "category": "product_version", "name": "apache2-example-pages-2.4.23-29.43.1.x86_64", "product": { "name": "apache2-example-pages-2.4.23-29.43.1.x86_64", "product_id": "apache2-example-pages-2.4.23-29.43.1.x86_64" } }, { "category": "product_version", "name": "apache2-prefork-2.4.23-29.43.1.x86_64", "product": { "name": "apache2-prefork-2.4.23-29.43.1.x86_64", "product_id": "apache2-prefork-2.4.23-29.43.1.x86_64" } }, { "category": "product_version", "name": "apache2-utils-2.4.23-29.43.1.x86_64", "product": { "name": "apache2-utils-2.4.23-29.43.1.x86_64", "product_id": "apache2-utils-2.4.23-29.43.1.x86_64" } }, { "category": "product_version", "name": "apache2-worker-2.4.23-29.43.1.x86_64", "product": { "name": "apache2-worker-2.4.23-29.43.1.x86_64", "product_id": "apache2-worker-2.4.23-29.43.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12 SP4", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP4", "product": { "name": "SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "apache2-devel-2.4.23-29.43.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.43.1.aarch64" }, "product_reference": "apache2-devel-2.4.23-29.43.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-devel-2.4.23-29.43.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.43.1.ppc64le" }, "product_reference": "apache2-devel-2.4.23-29.43.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-devel-2.4.23-29.43.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.43.1.s390x" }, "product_reference": "apache2-devel-2.4.23-29.43.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-devel-2.4.23-29.43.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.43.1.x86_64" }, "product_reference": "apache2-devel-2.4.23-29.43.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-2.4.23-29.43.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.43.1.aarch64" }, "product_reference": "apache2-2.4.23-29.43.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-2.4.23-29.43.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.43.1.ppc64le" }, "product_reference": "apache2-2.4.23-29.43.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-2.4.23-29.43.1.s390x as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.43.1.s390x" }, "product_reference": "apache2-2.4.23-29.43.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-2.4.23-29.43.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.43.1.x86_64" }, "product_reference": "apache2-2.4.23-29.43.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-doc-2.4.23-29.43.1.noarch as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:apache2-doc-2.4.23-29.43.1.noarch" }, "product_reference": "apache2-doc-2.4.23-29.43.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-example-pages-2.4.23-29.43.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.43.1.aarch64" }, "product_reference": "apache2-example-pages-2.4.23-29.43.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-example-pages-2.4.23-29.43.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.43.1.ppc64le" }, "product_reference": "apache2-example-pages-2.4.23-29.43.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-example-pages-2.4.23-29.43.1.s390x as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.43.1.s390x" }, "product_reference": "apache2-example-pages-2.4.23-29.43.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-example-pages-2.4.23-29.43.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.43.1.x86_64" }, "product_reference": "apache2-example-pages-2.4.23-29.43.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-prefork-2.4.23-29.43.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.43.1.aarch64" }, "product_reference": "apache2-prefork-2.4.23-29.43.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-prefork-2.4.23-29.43.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.43.1.ppc64le" }, "product_reference": "apache2-prefork-2.4.23-29.43.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-prefork-2.4.23-29.43.1.s390x as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.43.1.s390x" }, "product_reference": "apache2-prefork-2.4.23-29.43.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-prefork-2.4.23-29.43.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.43.1.x86_64" }, "product_reference": "apache2-prefork-2.4.23-29.43.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-utils-2.4.23-29.43.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.43.1.aarch64" }, "product_reference": "apache2-utils-2.4.23-29.43.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-utils-2.4.23-29.43.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.43.1.ppc64le" }, "product_reference": "apache2-utils-2.4.23-29.43.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-utils-2.4.23-29.43.1.s390x as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.43.1.s390x" }, "product_reference": "apache2-utils-2.4.23-29.43.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-utils-2.4.23-29.43.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.43.1.x86_64" }, "product_reference": "apache2-utils-2.4.23-29.43.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-worker-2.4.23-29.43.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.43.1.aarch64" }, "product_reference": "apache2-worker-2.4.23-29.43.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-worker-2.4.23-29.43.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.43.1.ppc64le" }, "product_reference": "apache2-worker-2.4.23-29.43.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-worker-2.4.23-29.43.1.s390x as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.43.1.s390x" }, "product_reference": "apache2-worker-2.4.23-29.43.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-worker-2.4.23-29.43.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.43.1.x86_64" }, "product_reference": "apache2-worker-2.4.23-29.43.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-2.4.23-29.43.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.43.1.aarch64" }, "product_reference": "apache2-2.4.23-29.43.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-2.4.23-29.43.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.43.1.ppc64le" }, "product_reference": "apache2-2.4.23-29.43.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-2.4.23-29.43.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.43.1.s390x" }, "product_reference": "apache2-2.4.23-29.43.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-2.4.23-29.43.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.43.1.x86_64" }, "product_reference": "apache2-2.4.23-29.43.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-doc-2.4.23-29.43.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-doc-2.4.23-29.43.1.noarch" }, "product_reference": "apache2-doc-2.4.23-29.43.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-example-pages-2.4.23-29.43.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.43.1.aarch64" }, "product_reference": "apache2-example-pages-2.4.23-29.43.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-example-pages-2.4.23-29.43.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.43.1.ppc64le" }, "product_reference": "apache2-example-pages-2.4.23-29.43.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-example-pages-2.4.23-29.43.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.43.1.s390x" }, "product_reference": "apache2-example-pages-2.4.23-29.43.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-example-pages-2.4.23-29.43.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.43.1.x86_64" }, "product_reference": "apache2-example-pages-2.4.23-29.43.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-prefork-2.4.23-29.43.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.43.1.aarch64" }, "product_reference": "apache2-prefork-2.4.23-29.43.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-prefork-2.4.23-29.43.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.43.1.ppc64le" }, "product_reference": "apache2-prefork-2.4.23-29.43.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-prefork-2.4.23-29.43.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.43.1.s390x" }, "product_reference": "apache2-prefork-2.4.23-29.43.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-prefork-2.4.23-29.43.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.43.1.x86_64" }, "product_reference": "apache2-prefork-2.4.23-29.43.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-utils-2.4.23-29.43.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.43.1.aarch64" }, "product_reference": "apache2-utils-2.4.23-29.43.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-utils-2.4.23-29.43.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.43.1.ppc64le" }, "product_reference": "apache2-utils-2.4.23-29.43.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-utils-2.4.23-29.43.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.43.1.s390x" }, "product_reference": "apache2-utils-2.4.23-29.43.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-utils-2.4.23-29.43.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.43.1.x86_64" }, "product_reference": "apache2-utils-2.4.23-29.43.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-worker-2.4.23-29.43.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.43.1.aarch64" }, "product_reference": "apache2-worker-2.4.23-29.43.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-worker-2.4.23-29.43.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.43.1.ppc64le" }, "product_reference": "apache2-worker-2.4.23-29.43.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-worker-2.4.23-29.43.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.43.1.s390x" }, "product_reference": "apache2-worker-2.4.23-29.43.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-worker-2.4.23-29.43.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.43.1.x86_64" }, "product_reference": "apache2-worker-2.4.23-29.43.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-10081", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-10081" } ], "notes": [ { "category": "general", "text": "HTTP/2 (2.4.20 through 2.4.39) very early pushes, for example configured with \"H2PushResource\", could lead to an overwrite of memory in the pushing request\u0027s pool, leading to crashes. The memory copied is that of the configured push link header values, not data supplied by the client.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-doc-2.4.23-29.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-doc-2.4.23-29.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.43.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-10081", "url": "https://www.suse.com/security/cve/CVE-2019-10081" }, { "category": "external", "summary": "SUSE Bug 1145742 for CVE-2019-10081", "url": "https://bugzilla.suse.com/1145742" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-doc-2.4.23-29.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-doc-2.4.23-29.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.43.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-doc-2.4.23-29.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-doc-2.4.23-29.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.43.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-06T14:08:14Z", "details": "moderate" } ], "title": "CVE-2019-10081" }, { "cve": "CVE-2019-10082", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-10082" } ], "notes": [ { "category": "general", "text": "In Apache HTTP Server 2.4.18-2.4.39, using fuzzed network input, the http/2 session handling could be made to read memory after being freed, during connection shutdown.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-doc-2.4.23-29.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-doc-2.4.23-29.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.43.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-10082", "url": "https://www.suse.com/security/cve/CVE-2019-10082" }, { "category": "external", "summary": "SUSE Bug 1145741 for CVE-2019-10082", "url": "https://bugzilla.suse.com/1145741" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-doc-2.4.23-29.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-doc-2.4.23-29.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.43.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-doc-2.4.23-29.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-doc-2.4.23-29.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.43.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-06T14:08:14Z", "details": "moderate" } ], "title": "CVE-2019-10082" }, { "cve": "CVE-2019-10092", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-10092" } ], "notes": [ { "category": "general", "text": "In Apache HTTP Server 2.4.0-2.4.39, a limited cross-site scripting issue was reported affecting the mod_proxy error page. An attacker could cause the link on the error page to be malformed and instead point to a page of their choice. This would only be exploitable where a server was set up with proxying enabled but was misconfigured in such a way that the Proxy Error page was displayed.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-doc-2.4.23-29.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-doc-2.4.23-29.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.43.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-10092", "url": "https://www.suse.com/security/cve/CVE-2019-10092" }, { "category": "external", "summary": "SUSE Bug 1145740 for CVE-2019-10092", "url": "https://bugzilla.suse.com/1145740" }, { "category": "external", "summary": "SUSE Bug 1182703 for CVE-2019-10092", "url": "https://bugzilla.suse.com/1182703" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-doc-2.4.23-29.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-doc-2.4.23-29.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.43.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-doc-2.4.23-29.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-doc-2.4.23-29.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.43.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-06T14:08:14Z", "details": "important" } ], "title": "CVE-2019-10092" }, { "cve": "CVE-2019-10098", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-10098" } ], "notes": [ { "category": "general", "text": "In Apache HTTP server 2.4.0 to 2.4.39, Redirects configured with mod_rewrite that were intended to be self-referential might be fooled by encoded newlines and redirect instead to an unexpected URL within the request URL.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-doc-2.4.23-29.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-doc-2.4.23-29.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.43.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-10098", "url": "https://www.suse.com/security/cve/CVE-2019-10098" }, { "category": "external", "summary": "SUSE Bug 1145738 for CVE-2019-10098", "url": "https://bugzilla.suse.com/1145738" }, { "category": "external", "summary": "SUSE Bug 1168407 for CVE-2019-10098", "url": "https://bugzilla.suse.com/1168407" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-doc-2.4.23-29.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-doc-2.4.23-29.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.43.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-doc-2.4.23-29.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-doc-2.4.23-29.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.43.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-06T14:08:14Z", "details": "important" } ], "title": "CVE-2019-10098" }, { "cve": "CVE-2019-9517", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9517" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to unconstrained interal data buffering, potentially leading to a denial of service. The attacker opens the HTTP/2 window so the peer can send without constraint; however, they leave the TCP window closed so the peer cannot actually write (many of) the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the servers queue the responses, this can consume excess memory, CPU, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-doc-2.4.23-29.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-doc-2.4.23-29.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.43.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9517", "url": "https://www.suse.com/security/cve/CVE-2019-9517" }, { "category": "external", "summary": "SUSE Bug 1145575 for CVE-2019-9517", "url": "https://bugzilla.suse.com/1145575" }, { "category": "external", "summary": "SUSE Bug 1146097 for CVE-2019-9517", "url": "https://bugzilla.suse.com/1146097" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-doc-2.4.23-29.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-doc-2.4.23-29.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.43.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-doc-2.4.23-29.43.1.noarch", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-example-pages-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-prefork-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-utils-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server 12 SP4:apache2-worker-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-doc-2.4.23-29.43.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-example-pages-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-prefork-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-utils-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:apache2-worker-2.4.23-29.43.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.43.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.43.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.43.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:apache2-devel-2.4.23-29.43.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-06T14:08:14Z", "details": "moderate" } ], "title": "CVE-2019-9517" } ] }
suse-su-2020:0059-1
Vulnerability from csaf_suse
Published
2020-01-09 12:30
Modified
2020-01-09 12:30
Summary
Security update for nodejs12
Notes
Title of the patch
Security update for nodejs12
Description of the patch
This update for nodejs12 fixes the following issues:
Update to LTS release 12.13.0 (jsc#SLE-8947).
Security issues fixed:
- CVE-2019-9511: Fixed the HTTP/2 implementation that was vulnerable to window size manipulations (bsc#1146091).
- CVE-2019-9512: Fixed the HTTP/2 implementation that was vulnerable to floods using PING frames (bsc#1146099).
- CVE-2019-9513: Fixed the HTTP/2 implementation that was vulnerable to resource loops, potentially leading to a denial of service (bsc#1146094).
- CVE-2019-9514: Fixed the HTTP/2 implementation that was vulnerable to a reset flood, potentially leading to a denial of service (bsc#1146095).
- CVE-2019-9515: Fixed the HTTP/2 implementation that was vulnerable to a SETTINGS frame flood (bsc#1146100).
- CVE-2019-9516: Fixed the HTTP/2 implementation that was vulnerable to a header leak, potentially leading to a denial of service (bsc#1146090).
- CVE-2019-9517: Fixed the HTTP/2 implementation that was vulnerable to unconstrained interal data buffering (bsc#1146097).
- CVE-2019-9518: Fixed the HTTP/2 implementation that was vulnerable to a flood of empty frames, potentially leading to a denial of service (bsc#1146093).
- CVE-2019-13173: Fixed a file overwrite in the fstream.DirWriter() function (bsc#1140290).
Patchnames
SUSE-2020-59,SUSE-SLE-Module-Web-Scripting-12-2020-59
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for nodejs12", "title": "Title of the patch" }, { "category": "description", "text": "This update for nodejs12 fixes the following issues:\n\nUpdate to LTS release 12.13.0 (jsc#SLE-8947).\n\nSecurity issues fixed:\n\n- CVE-2019-9511: Fixed the HTTP/2 implementation that was vulnerable to window size manipulations (bsc#1146091).\n- CVE-2019-9512: Fixed the HTTP/2 implementation that was vulnerable to floods using PING frames (bsc#1146099).\n- CVE-2019-9513: Fixed the HTTP/2 implementation that was vulnerable to resource loops, potentially leading to a denial of service (bsc#1146094).\n- CVE-2019-9514: Fixed the HTTP/2 implementation that was vulnerable to a reset flood, potentially leading to a denial of service (bsc#1146095).\n- CVE-2019-9515: Fixed the HTTP/2 implementation that was vulnerable to a SETTINGS frame flood (bsc#1146100).\n- CVE-2019-9516: Fixed the HTTP/2 implementation that was vulnerable to a header leak, potentially leading to a denial of service (bsc#1146090).\n- CVE-2019-9517: Fixed the HTTP/2 implementation that was vulnerable to unconstrained interal data buffering (bsc#1146097).\n- CVE-2019-9518: Fixed the HTTP/2 implementation that was vulnerable to a flood of empty frames, potentially leading to a denial of service (bsc#1146093).\n- CVE-2019-13173: Fixed a file overwrite in the fstream.DirWriter() function (bsc#1140290).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-59,SUSE-SLE-Module-Web-Scripting-12-2020-59", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_0059-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:0059-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20200059-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:0059-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-January/006320.html" }, { "category": "self", "summary": "SUSE Bug 1140290", "url": "https://bugzilla.suse.com/1140290" }, { "category": "self", "summary": "SUSE Bug 1146090", "url": "https://bugzilla.suse.com/1146090" }, { "category": "self", "summary": "SUSE Bug 1146091", "url": "https://bugzilla.suse.com/1146091" }, { "category": "self", "summary": "SUSE Bug 1146093", "url": "https://bugzilla.suse.com/1146093" }, { "category": "self", "summary": "SUSE Bug 1146094", "url": "https://bugzilla.suse.com/1146094" }, { "category": "self", "summary": "SUSE Bug 1146095", "url": "https://bugzilla.suse.com/1146095" }, { "category": "self", "summary": "SUSE Bug 1146097", "url": "https://bugzilla.suse.com/1146097" }, { "category": "self", "summary": "SUSE Bug 1146099", "url": "https://bugzilla.suse.com/1146099" }, { "category": "self", "summary": "SUSE Bug 1146100", "url": "https://bugzilla.suse.com/1146100" }, { "category": "self", "summary": "SUSE Bug 1149792", "url": "https://bugzilla.suse.com/1149792" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13173 page", "url": "https://www.suse.com/security/cve/CVE-2019-13173/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9511 page", "url": "https://www.suse.com/security/cve/CVE-2019-9511/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9512 page", "url": "https://www.suse.com/security/cve/CVE-2019-9512/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9513 page", "url": "https://www.suse.com/security/cve/CVE-2019-9513/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9514 page", "url": "https://www.suse.com/security/cve/CVE-2019-9514/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9515 page", "url": "https://www.suse.com/security/cve/CVE-2019-9515/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9516 page", "url": "https://www.suse.com/security/cve/CVE-2019-9516/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9517 page", "url": "https://www.suse.com/security/cve/CVE-2019-9517/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9518 page", "url": "https://www.suse.com/security/cve/CVE-2019-9518/" }, { "category": "self", "summary": "SUSE Bug SLE-8947", "url": "https://bugzilla.suse.com/SLE-8947" } ], "title": "Security update for nodejs12", "tracking": { "current_release_date": "2020-01-09T12:30:16Z", "generator": { "date": "2020-01-09T12:30:16Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:0059-1", "initial_release_date": "2020-01-09T12:30:16Z", "revision_history": [ { "date": "2020-01-09T12:30:16Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "nodejs12-12.13.0-1.3.1.aarch64", "product": { "name": "nodejs12-12.13.0-1.3.1.aarch64", "product_id": "nodejs12-12.13.0-1.3.1.aarch64" } }, { "category": "product_version", "name": "nodejs12-devel-12.13.0-1.3.1.aarch64", "product": { "name": "nodejs12-devel-12.13.0-1.3.1.aarch64", "product_id": "nodejs12-devel-12.13.0-1.3.1.aarch64" } }, { "category": "product_version", "name": "npm12-12.13.0-1.3.1.aarch64", "product": { "name": "npm12-12.13.0-1.3.1.aarch64", "product_id": "npm12-12.13.0-1.3.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "nodejs12-docs-12.13.0-1.3.1.noarch", "product": { "name": "nodejs12-docs-12.13.0-1.3.1.noarch", "product_id": "nodejs12-docs-12.13.0-1.3.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "nodejs12-12.13.0-1.3.1.ppc64le", "product": { "name": "nodejs12-12.13.0-1.3.1.ppc64le", "product_id": "nodejs12-12.13.0-1.3.1.ppc64le" } }, { "category": "product_version", "name": "nodejs12-devel-12.13.0-1.3.1.ppc64le", "product": { "name": "nodejs12-devel-12.13.0-1.3.1.ppc64le", "product_id": "nodejs12-devel-12.13.0-1.3.1.ppc64le" } }, { "category": "product_version", "name": "npm12-12.13.0-1.3.1.ppc64le", "product": { "name": "npm12-12.13.0-1.3.1.ppc64le", "product_id": "npm12-12.13.0-1.3.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "nodejs12-12.13.0-1.3.1.s390x", "product": { "name": "nodejs12-12.13.0-1.3.1.s390x", "product_id": "nodejs12-12.13.0-1.3.1.s390x" } }, { "category": "product_version", "name": "nodejs12-devel-12.13.0-1.3.1.s390x", "product": { "name": "nodejs12-devel-12.13.0-1.3.1.s390x", "product_id": "nodejs12-devel-12.13.0-1.3.1.s390x" } }, { "category": "product_version", "name": "npm12-12.13.0-1.3.1.s390x", "product": { "name": "npm12-12.13.0-1.3.1.s390x", "product_id": "npm12-12.13.0-1.3.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "nodejs12-12.13.0-1.3.1.x86_64", "product": { "name": "nodejs12-12.13.0-1.3.1.x86_64", "product_id": "nodejs12-12.13.0-1.3.1.x86_64" } }, { "category": "product_version", "name": "nodejs12-devel-12.13.0-1.3.1.x86_64", "product": { "name": "nodejs12-devel-12.13.0-1.3.1.x86_64", "product_id": "nodejs12-devel-12.13.0-1.3.1.x86_64" } }, { "category": "product_version", "name": "npm12-12.13.0-1.3.1.x86_64", "product": { "name": "npm12-12.13.0-1.3.1.x86_64", "product_id": "npm12-12.13.0-1.3.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Web and Scripting 12", "product": { "name": "SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-web-scripting:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "nodejs12-12.13.0-1.3.1.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.aarch64" }, "product_reference": "nodejs12-12.13.0-1.3.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs12-12.13.0-1.3.1.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.ppc64le" }, "product_reference": "nodejs12-12.13.0-1.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs12-12.13.0-1.3.1.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.s390x" }, "product_reference": "nodejs12-12.13.0-1.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs12-12.13.0-1.3.1.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.x86_64" }, "product_reference": "nodejs12-12.13.0-1.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs12-devel-12.13.0-1.3.1.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.aarch64" }, "product_reference": "nodejs12-devel-12.13.0-1.3.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs12-devel-12.13.0-1.3.1.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.ppc64le" }, "product_reference": "nodejs12-devel-12.13.0-1.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs12-devel-12.13.0-1.3.1.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.s390x" }, "product_reference": "nodejs12-devel-12.13.0-1.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs12-devel-12.13.0-1.3.1.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.x86_64" }, "product_reference": "nodejs12-devel-12.13.0-1.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs12-docs-12.13.0-1.3.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.13.0-1.3.1.noarch" }, "product_reference": "nodejs12-docs-12.13.0-1.3.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "npm12-12.13.0-1.3.1.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.aarch64" }, "product_reference": "npm12-12.13.0-1.3.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "npm12-12.13.0-1.3.1.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.ppc64le" }, "product_reference": "npm12-12.13.0-1.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "npm12-12.13.0-1.3.1.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.s390x" }, "product_reference": "npm12-12.13.0-1.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "npm12-12.13.0-1.3.1.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.x86_64" }, "product_reference": "npm12-12.13.0-1.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-13173", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-13173" } ], "notes": [ { "category": "general", "text": "fstream before 1.0.12 is vulnerable to Arbitrary File Overwrite. Extracting tarballs containing a hardlink to a file that already exists in the system, and a file that matches the hardlink, will overwrite the system\u0027s file with the contents of the extracted file. The fstream.DirWriter() function is vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.13.0-1.3.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-13173", "url": "https://www.suse.com/security/cve/CVE-2019-13173" }, { "category": "external", "summary": "SUSE Bug 1140290 for CVE-2019-13173", "url": "https://bugzilla.suse.com/1140290" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.13.0-1.3.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.13.0-1.3.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-09T12:30:16Z", "details": "moderate" } ], "title": "CVE-2019-13173" }, { "cve": "CVE-2019-9511", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9511" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.13.0-1.3.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9511", "url": "https://www.suse.com/security/cve/CVE-2019-9511" }, { "category": "external", "summary": "SUSE Bug 1145579 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1145579" }, { "category": "external", "summary": "SUSE Bug 1146091 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1146091" }, { "category": "external", "summary": "SUSE Bug 1146182 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1146182" }, { "category": "external", "summary": "SUSE Bug 1193427 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1193427" }, { "category": "external", "summary": "SUSE Bug 1202787 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1202787" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.13.0-1.3.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.13.0-1.3.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-09T12:30:16Z", "details": "low" } ], "title": "CVE-2019-9511" }, { "cve": "CVE-2019-9512", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9512" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.13.0-1.3.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9512", "url": "https://www.suse.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146099 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1146099" }, { "category": "external", "summary": "SUSE Bug 1146111 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1146111" }, { "category": "external", "summary": "SUSE Bug 1147142 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1147142" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.13.0-1.3.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.13.0-1.3.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-09T12:30:16Z", "details": "important" } ], "title": "CVE-2019-9512" }, { "cve": "CVE-2019-9513", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9513" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.13.0-1.3.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9513", "url": "https://www.suse.com/security/cve/CVE-2019-9513" }, { "category": "external", "summary": "SUSE Bug 1145580 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1145580" }, { "category": "external", "summary": "SUSE Bug 1146094 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1146094" }, { "category": "external", "summary": "SUSE Bug 1146184 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1146184" }, { "category": "external", "summary": "SUSE Bug 1193427 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1193427" }, { "category": "external", "summary": "SUSE Bug 1202787 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1202787" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.13.0-1.3.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.13.0-1.3.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-09T12:30:16Z", "details": "low" } ], "title": "CVE-2019-9513" }, { "cve": "CVE-2019-9514", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9514" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.13.0-1.3.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9514", "url": "https://www.suse.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "SUSE Bug 1145662 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1145662" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146095 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1146095" }, { "category": "external", "summary": "SUSE Bug 1146115 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1146115" }, { "category": "external", "summary": "SUSE Bug 1147142 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1147142" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.13.0-1.3.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.13.0-1.3.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-09T12:30:16Z", "details": "important" } ], "title": "CVE-2019-9514" }, { "cve": "CVE-2019-9515", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9515" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to a settings flood, potentially leading to a denial of service. The attacker sends a stream of SETTINGS frames to the peer. Since the RFC requires that the peer reply with one acknowledgement per SETTINGS frame, an empty SETTINGS frame is almost equivalent in behavior to a ping. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.13.0-1.3.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9515", "url": "https://www.suse.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9515", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146100 for CVE-2019-9515", "url": "https://bugzilla.suse.com/1146100" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.13.0-1.3.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.13.0-1.3.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-09T12:30:16Z", "details": "important" } ], "title": "CVE-2019-9515" }, { "cve": "CVE-2019-9516", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9516" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service. The attacker sends a stream of headers with a 0-length header name and 0-length header value, optionally Huffman encoded into 1-byte or greater headers. Some implementations allocate memory for these headers and keep the allocation alive until the session dies. This can consume excess memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.13.0-1.3.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9516", "url": "https://www.suse.com/security/cve/CVE-2019-9516" }, { "category": "external", "summary": "SUSE Bug 1145582 for CVE-2019-9516", "url": "https://bugzilla.suse.com/1145582" }, { "category": "external", "summary": "SUSE Bug 1146090 for CVE-2019-9516", "url": "https://bugzilla.suse.com/1146090" }, { "category": "external", "summary": "SUSE Bug 1193427 for CVE-2019-9516", "url": "https://bugzilla.suse.com/1193427" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.13.0-1.3.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.13.0-1.3.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-09T12:30:16Z", "details": "low" } ], "title": "CVE-2019-9516" }, { "cve": "CVE-2019-9517", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9517" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to unconstrained interal data buffering, potentially leading to a denial of service. The attacker opens the HTTP/2 window so the peer can send without constraint; however, they leave the TCP window closed so the peer cannot actually write (many of) the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the servers queue the responses, this can consume excess memory, CPU, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.13.0-1.3.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9517", "url": "https://www.suse.com/security/cve/CVE-2019-9517" }, { "category": "external", "summary": "SUSE Bug 1145575 for CVE-2019-9517", "url": "https://bugzilla.suse.com/1145575" }, { "category": "external", "summary": "SUSE Bug 1146097 for CVE-2019-9517", "url": "https://bugzilla.suse.com/1146097" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.13.0-1.3.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.13.0-1.3.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-09T12:30:16Z", "details": "moderate" } ], "title": "CVE-2019-9517" }, { "cve": "CVE-2019-9518", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9518" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leading to a denial of service. The attacker sends a stream of frames with an empty payload and without the end-of-stream flag. These frames can be DATA, HEADERS, CONTINUATION and/or PUSH_PROMISE. The peer spends time processing each frame disproportionate to attack bandwidth. This can consume excess CPU.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.13.0-1.3.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9518", "url": "https://www.suse.com/security/cve/CVE-2019-9518" }, { "category": "external", "summary": "SUSE Bug 1145662 for CVE-2019-9518", "url": "https://bugzilla.suse.com/1145662" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9518", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146093 for CVE-2019-9518", "url": "https://bugzilla.suse.com/1146093" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.13.0-1.3.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.13.0-1.3.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-09T12:30:16Z", "details": "important" } ], "title": "CVE-2019-9518" } ] }
suse-su-2019:14246-1
Vulnerability from csaf_suse
Published
2020-01-17 17:07
Modified
2020-01-17 17:07
Summary
Security update for Mozilla Firefox
Notes
Title of the patch
Security update for Mozilla Firefox
Description of the patch
This update contains the Mozilla Firefox ESR 68.2 release.
Mozilla Firefox was updated to ESR 68.2 release:
* Enterprise: New administrative policies were added. More
information and templates are available at the Policy
Templates page.
* Various security fixes:
MFSA 2019-33 (bsc#1154738)
* CVE-2019-15903: Heap overflow in expat library in XML_GetCurrentLineNumber
* CVE-2019-11757: Use-after-free when creating index updates in IndexedDB
* CVE-2019-11758: Potentially exploitable crash due to 360 Total Security
* CVE-2019-11759: Stack buffer overflow in HKDF output
* CVE-2019-11760: Stack buffer overflow in WebRTC networking
* CVE-2019-11761: Unintended access to a privileged JSONView object
* CVE-2019-11762: document.domain-based origin isolation has same-origin- property violation
* CVE-2019-11763: Incorrect HTML parsing results in XSS bypass technique
* CVE-2019-11764: Memory safety bugs fixed in Firefox 70 and Firefox ESR 68.2
Other Issues resolved:
* [bsc#1104841] Newer versions of firefox have a dependency on
GLIBCXX_3.4.20
* [bsc#1074235] MozillaFirefox: background tab crash reports sent
inadvertently without user opt-in
* [bsc#1043008] Firefox hangs randomly when browsing and
scrolling
* [bsc#1025108] Firefox stops loading page until mouse is moved
* [bsc#905528] Firefox malfunctions due to broken omni.ja
archives
Patchnames
slessp4-firefox-201910-14246
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Mozilla Firefox", "title": "Title of the patch" }, { "category": "description", "text": "\nThis update contains the Mozilla Firefox ESR 68.2 release.\n\nMozilla Firefox was updated to ESR 68.2 release:\n\n* Enterprise: New administrative policies were added. More\n information and templates are available at the Policy\n Templates page.\n\n* Various security fixes:\n MFSA 2019-33 (bsc#1154738)\n * CVE-2019-15903: Heap overflow in expat library in XML_GetCurrentLineNumber\n * CVE-2019-11757: Use-after-free when creating index updates in IndexedDB\n * CVE-2019-11758: Potentially exploitable crash due to 360 Total Security\n * CVE-2019-11759: Stack buffer overflow in HKDF output\n * CVE-2019-11760: Stack buffer overflow in WebRTC networking\n * CVE-2019-11761: Unintended access to a privileged JSONView object\n * CVE-2019-11762: document.domain-based origin isolation has same-origin- property violation\n * CVE-2019-11763: Incorrect HTML parsing results in XSS bypass technique\n * CVE-2019-11764: Memory safety bugs fixed in Firefox 70 and Firefox ESR 68.2\n\nOther Issues resolved:\n\n* [bsc#1104841] Newer versions of firefox have a dependency on\n GLIBCXX_3.4.20\n* [bsc#1074235] MozillaFirefox: background tab crash reports sent\n inadvertently without user opt-in\n* [bsc#1043008] Firefox hangs randomly when browsing and\n scrolling\n* [bsc#1025108] Firefox stops loading page until mouse is moved\n* [bsc#905528] Firefox malfunctions due to broken omni.ja\n archives\n\n", "title": "Description of the patch" }, { "category": "details", "text": "slessp4-firefox-201910-14246", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_14246-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:14246-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-201914246-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:14246-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" }, { "category": "self", "summary": "SUSE Bug 1000036", "url": "https://bugzilla.suse.com/1000036" }, { "category": "self", "summary": "SUSE Bug 1001652", "url": "https://bugzilla.suse.com/1001652" }, { "category": "self", "summary": "SUSE Bug 1025108", "url": "https://bugzilla.suse.com/1025108" }, { "category": "self", "summary": "SUSE Bug 1029377", "url": "https://bugzilla.suse.com/1029377" }, { "category": "self", "summary": "SUSE Bug 1029902", "url": "https://bugzilla.suse.com/1029902" }, { "category": "self", "summary": "SUSE Bug 1040164", "url": "https://bugzilla.suse.com/1040164" }, { "category": "self", "summary": "SUSE Bug 104105", "url": "https://bugzilla.suse.com/104105" }, { "category": "self", "summary": "SUSE Bug 1042670", "url": "https://bugzilla.suse.com/1042670" }, { "category": "self", "summary": "SUSE Bug 1043008", "url": "https://bugzilla.suse.com/1043008" }, { "category": "self", "summary": "SUSE Bug 1044946", "url": "https://bugzilla.suse.com/1044946" }, { "category": "self", "summary": "SUSE Bug 1047925", "url": "https://bugzilla.suse.com/1047925" }, { "category": "self", "summary": "SUSE Bug 1047936", "url": "https://bugzilla.suse.com/1047936" }, { "category": "self", "summary": "SUSE Bug 1048299", "url": "https://bugzilla.suse.com/1048299" }, { "category": "self", "summary": "SUSE Bug 1049186", "url": "https://bugzilla.suse.com/1049186" }, { "category": "self", "summary": "SUSE Bug 1050653", "url": "https://bugzilla.suse.com/1050653" }, { "category": "self", "summary": "SUSE Bug 1056058", "url": "https://bugzilla.suse.com/1056058" }, { "category": "self", "summary": "SUSE Bug 1058013", "url": "https://bugzilla.suse.com/1058013" }, { "category": "self", "summary": "SUSE Bug 1066242", "url": "https://bugzilla.suse.com/1066242" }, { "category": "self", "summary": "SUSE Bug 1066953", "url": "https://bugzilla.suse.com/1066953" }, { "category": "self", "summary": "SUSE Bug 1070738", "url": "https://bugzilla.suse.com/1070738" }, { "category": "self", "summary": "SUSE Bug 1070853", "url": "https://bugzilla.suse.com/1070853" }, { "category": "self", "summary": "SUSE Bug 1072320", "url": "https://bugzilla.suse.com/1072320" }, { "category": "self", "summary": "SUSE Bug 1072322", "url": "https://bugzilla.suse.com/1072322" }, { "category": "self", "summary": "SUSE Bug 1073796", "url": "https://bugzilla.suse.com/1073796" }, { "category": "self", "summary": "SUSE Bug 1073798", "url": "https://bugzilla.suse.com/1073798" }, { "category": "self", "summary": "SUSE Bug 1073799", "url": "https://bugzilla.suse.com/1073799" }, { "category": "self", "summary": "SUSE Bug 1073803", "url": "https://bugzilla.suse.com/1073803" }, { "category": "self", "summary": "SUSE Bug 1073808", "url": "https://bugzilla.suse.com/1073808" }, { "category": "self", "summary": "SUSE Bug 1073818", "url": "https://bugzilla.suse.com/1073818" }, { "category": "self", "summary": "SUSE Bug 1073823", "url": "https://bugzilla.suse.com/1073823" }, { "category": "self", "summary": "SUSE Bug 1073829", "url": "https://bugzilla.suse.com/1073829" }, { "category": "self", "summary": "SUSE Bug 1073830", "url": "https://bugzilla.suse.com/1073830" }, { "category": "self", "summary": "SUSE Bug 1073832", "url": "https://bugzilla.suse.com/1073832" }, { "category": "self", "summary": "SUSE Bug 1073846", "url": "https://bugzilla.suse.com/1073846" }, { "category": "self", "summary": "SUSE Bug 1074235", "url": "https://bugzilla.suse.com/1074235" }, { "category": "self", "summary": "SUSE Bug 1077230", "url": "https://bugzilla.suse.com/1077230" }, { "category": "self", "summary": "SUSE Bug 1079761", "url": "https://bugzilla.suse.com/1079761" }, { "category": "self", "summary": "SUSE Bug 1081750", "url": "https://bugzilla.suse.com/1081750" }, { "category": "self", "summary": "SUSE Bug 1082318", "url": "https://bugzilla.suse.com/1082318" }, { "category": "self", "summary": "SUSE Bug 1087453", "url": "https://bugzilla.suse.com/1087453" }, { "category": "self", "summary": "SUSE Bug 1087459", "url": "https://bugzilla.suse.com/1087459" }, { "category": "self", "summary": "SUSE Bug 1087463", "url": "https://bugzilla.suse.com/1087463" }, { "category": "self", "summary": "SUSE Bug 1088573", "url": "https://bugzilla.suse.com/1088573" }, { "category": "self", "summary": "SUSE Bug 1091764", "url": "https://bugzilla.suse.com/1091764" }, { "category": "self", "summary": "SUSE Bug 1094814", "url": "https://bugzilla.suse.com/1094814" }, { "category": "self", "summary": "SUSE Bug 1097158", "url": "https://bugzilla.suse.com/1097158" }, { "category": "self", "summary": "SUSE Bug 1097375", "url": "https://bugzilla.suse.com/1097375" }, { "category": "self", "summary": "SUSE Bug 1097401", "url": "https://bugzilla.suse.com/1097401" }, { "category": "self", "summary": "SUSE Bug 1097404", "url": "https://bugzilla.suse.com/1097404" }, { "category": "self", "summary": "SUSE Bug 1097748", "url": "https://bugzilla.suse.com/1097748" }, { "category": "self", "summary": "SUSE Bug 1104841", "url": "https://bugzilla.suse.com/1104841" }, { "category": "self", "summary": "SUSE Bug 1105019", "url": "https://bugzilla.suse.com/1105019" }, { "category": "self", "summary": "SUSE Bug 1107030", "url": "https://bugzilla.suse.com/1107030" }, { "category": "self", "summary": "SUSE Bug 1109465", "url": "https://bugzilla.suse.com/1109465" }, { "category": "self", "summary": "SUSE Bug 1117473", "url": "https://bugzilla.suse.com/1117473" }, { "category": "self", "summary": "SUSE Bug 1117626", "url": "https://bugzilla.suse.com/1117626" }, { "category": "self", "summary": "SUSE Bug 1117627", "url": "https://bugzilla.suse.com/1117627" }, { "category": "self", "summary": "SUSE Bug 1117629", "url": "https://bugzilla.suse.com/1117629" }, { "category": "self", "summary": "SUSE Bug 1117630", "url": "https://bugzilla.suse.com/1117630" }, { "category": "self", "summary": "SUSE Bug 1120644", "url": "https://bugzilla.suse.com/1120644" }, { "category": "self", "summary": "SUSE Bug 1122191", "url": "https://bugzilla.suse.com/1122191" }, { "category": "self", "summary": "SUSE Bug 1123482", "url": "https://bugzilla.suse.com/1123482" }, { "category": "self", "summary": "SUSE Bug 1124525", "url": "https://bugzilla.suse.com/1124525" }, { "category": "self", "summary": "SUSE Bug 1127532", "url": "https://bugzilla.suse.com/1127532" }, { "category": "self", "summary": "SUSE Bug 1129346", "url": "https://bugzilla.suse.com/1129346" }, { "category": "self", "summary": "SUSE Bug 1130694", "url": "https://bugzilla.suse.com/1130694" }, { "category": "self", "summary": "SUSE Bug 1130840", "url": "https://bugzilla.suse.com/1130840" }, { "category": "self", "summary": "SUSE Bug 1133452", "url": "https://bugzilla.suse.com/1133452" }, { "category": "self", "summary": "SUSE Bug 1133810", "url": "https://bugzilla.suse.com/1133810" }, { "category": "self", "summary": "SUSE Bug 1134209", "url": "https://bugzilla.suse.com/1134209" }, { "category": "self", "summary": "SUSE Bug 1138459", "url": "https://bugzilla.suse.com/1138459" }, { "category": "self", "summary": "SUSE Bug 1140290", "url": "https://bugzilla.suse.com/1140290" }, { "category": "self", "summary": "SUSE Bug 1140868", "url": "https://bugzilla.suse.com/1140868" }, { "category": "self", "summary": "SUSE Bug 1141853", "url": "https://bugzilla.suse.com/1141853" }, { "category": "self", "summary": "SUSE Bug 1144919", "url": "https://bugzilla.suse.com/1144919" }, { "category": "self", "summary": "SUSE Bug 1145665", "url": "https://bugzilla.suse.com/1145665" }, { "category": "self", "summary": "SUSE Bug 1146090", "url": "https://bugzilla.suse.com/1146090" }, { "category": "self", "summary": "SUSE Bug 1146091", "url": "https://bugzilla.suse.com/1146091" }, { "category": "self", "summary": "SUSE Bug 1146093", "url": "https://bugzilla.suse.com/1146093" }, { "category": "self", "summary": "SUSE Bug 1146094", "url": "https://bugzilla.suse.com/1146094" }, { "category": "self", "summary": "SUSE Bug 1146095", "url": "https://bugzilla.suse.com/1146095" }, { "category": "self", "summary": "SUSE Bug 1146097", "url": "https://bugzilla.suse.com/1146097" }, { "category": "self", "summary": "SUSE Bug 1146099", "url": "https://bugzilla.suse.com/1146099" }, { "category": "self", "summary": "SUSE Bug 1146100", "url": "https://bugzilla.suse.com/1146100" }, { "category": "self", "summary": "SUSE Bug 1149323", "url": "https://bugzilla.suse.com/1149323" }, { "category": "self", "summary": "SUSE Bug 1153423", "url": "https://bugzilla.suse.com/1153423" }, { "category": "self", "summary": "SUSE Bug 1154738", "url": "https://bugzilla.suse.com/1154738" }, { "category": "self", "summary": "SUSE Bug 1447070", "url": "https://bugzilla.suse.com/1447070" }, { "category": "self", "summary": "SUSE Bug 1447409", "url": "https://bugzilla.suse.com/1447409" }, { "category": "self", "summary": "SUSE Bug 744625", "url": "https://bugzilla.suse.com/744625" }, { "category": "self", "summary": "SUSE Bug 744629", "url": "https://bugzilla.suse.com/744629" }, { "category": "self", "summary": "SUSE Bug 845955", "url": "https://bugzilla.suse.com/845955" }, { "category": "self", "summary": "SUSE Bug 865853", "url": "https://bugzilla.suse.com/865853" }, { "category": "self", "summary": "SUSE Bug 905528", "url": "https://bugzilla.suse.com/905528" }, { "category": "self", "summary": "SUSE Bug 917607", "url": "https://bugzilla.suse.com/917607" }, { "category": "self", "summary": "SUSE Bug 935856", "url": "https://bugzilla.suse.com/935856" }, { "category": "self", "summary": "SUSE Bug 937414", "url": "https://bugzilla.suse.com/937414" }, { "category": "self", "summary": "SUSE Bug 947747", "url": "https://bugzilla.suse.com/947747" }, { "category": "self", "summary": "SUSE Bug 948045", "url": "https://bugzilla.suse.com/948045" }, { "category": "self", "summary": "SUSE Bug 948602", "url": "https://bugzilla.suse.com/948602" }, { "category": "self", "summary": "SUSE Bug 955142", "url": "https://bugzilla.suse.com/955142" }, { "category": "self", "summary": "SUSE Bug 957814", "url": "https://bugzilla.suse.com/957814" }, { "category": "self", "summary": "SUSE Bug 957815", "url": "https://bugzilla.suse.com/957815" }, { "category": "self", "summary": "SUSE Bug 961254", "url": "https://bugzilla.suse.com/961254" }, { "category": "self", "summary": "SUSE Bug 962297", "url": "https://bugzilla.suse.com/962297" }, { "category": "self", "summary": "SUSE Bug 966076", "url": "https://bugzilla.suse.com/966076" }, { "category": "self", "summary": "SUSE Bug 966077", "url": "https://bugzilla.suse.com/966077" }, { "category": "self", "summary": "SUSE Bug 985201", "url": "https://bugzilla.suse.com/985201" }, { "category": "self", "summary": "SUSE Bug 986541", "url": "https://bugzilla.suse.com/986541" }, { "category": "self", "summary": "SUSE Bug 991344", "url": "https://bugzilla.suse.com/991344" }, { "category": "self", "summary": "SUSE Bug 998743", "url": "https://bugzilla.suse.com/998743" }, { "category": "self", "summary": "SUSE CVE CVE-2013-2882 page", "url": "https://www.suse.com/security/cve/CVE-2013-2882/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6639 page", "url": "https://www.suse.com/security/cve/CVE-2013-6639/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6640 page", "url": "https://www.suse.com/security/cve/CVE-2013-6640/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6668 page", "url": "https://www.suse.com/security/cve/CVE-2013-6668/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0224 page", "url": "https://www.suse.com/security/cve/CVE-2014-0224/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-3193 page", "url": "https://www.suse.com/security/cve/CVE-2015-3193/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-3194 page", "url": "https://www.suse.com/security/cve/CVE-2015-3194/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5380 page", "url": "https://www.suse.com/security/cve/CVE-2015-5380/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7384 page", "url": "https://www.suse.com/security/cve/CVE-2015-7384/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2086 page", "url": "https://www.suse.com/security/cve/CVE-2016-2086/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2178 page", "url": "https://www.suse.com/security/cve/CVE-2016-2178/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2183 page", "url": "https://www.suse.com/security/cve/CVE-2016-2183/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2216 page", "url": "https://www.suse.com/security/cve/CVE-2016-2216/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5172 page", "url": "https://www.suse.com/security/cve/CVE-2016-5172/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5325 page", "url": "https://www.suse.com/security/cve/CVE-2016-5325/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6304 page", "url": "https://www.suse.com/security/cve/CVE-2016-6304/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6306 page", "url": "https://www.suse.com/security/cve/CVE-2016-6306/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7052 page", "url": "https://www.suse.com/security/cve/CVE-2016-7052/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7099 page", "url": "https://www.suse.com/security/cve/CVE-2016-7099/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-1000381 page", "url": "https://www.suse.com/security/cve/CVE-2017-1000381/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-10686 page", "url": "https://www.suse.com/security/cve/CVE-2017-10686/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-11111 page", "url": "https://www.suse.com/security/cve/CVE-2017-11111/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-11499 page", "url": "https://www.suse.com/security/cve/CVE-2017-11499/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-14228 page", "url": "https://www.suse.com/security/cve/CVE-2017-14228/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-14849 page", "url": "https://www.suse.com/security/cve/CVE-2017-14849/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-14919 page", "url": "https://www.suse.com/security/cve/CVE-2017-14919/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-15896 page", "url": "https://www.suse.com/security/cve/CVE-2017-15896/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-15897 page", "url": "https://www.suse.com/security/cve/CVE-2017-15897/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17810 page", "url": "https://www.suse.com/security/cve/CVE-2017-17810/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17811 page", "url": "https://www.suse.com/security/cve/CVE-2017-17811/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17812 page", "url": "https://www.suse.com/security/cve/CVE-2017-17812/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17813 page", "url": "https://www.suse.com/security/cve/CVE-2017-17813/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17814 page", "url": "https://www.suse.com/security/cve/CVE-2017-17814/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17815 page", "url": "https://www.suse.com/security/cve/CVE-2017-17815/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17816 page", "url": "https://www.suse.com/security/cve/CVE-2017-17816/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17817 page", "url": "https://www.suse.com/security/cve/CVE-2017-17817/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17818 page", "url": "https://www.suse.com/security/cve/CVE-2017-17818/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17819 page", "url": "https://www.suse.com/security/cve/CVE-2017-17819/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17820 page", "url": "https://www.suse.com/security/cve/CVE-2017-17820/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-18207 page", "url": "https://www.suse.com/security/cve/CVE-2017-18207/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-3735 page", "url": "https://www.suse.com/security/cve/CVE-2017-3735/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-3736 page", "url": "https://www.suse.com/security/cve/CVE-2017-3736/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-3738 page", "url": "https://www.suse.com/security/cve/CVE-2017-3738/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-0732 page", "url": "https://www.suse.com/security/cve/CVE-2018-0732/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1000168 page", "url": "https://www.suse.com/security/cve/CVE-2018-1000168/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12115 page", "url": "https://www.suse.com/security/cve/CVE-2018-12115/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12116 page", "url": "https://www.suse.com/security/cve/CVE-2018-12116/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12121 page", "url": "https://www.suse.com/security/cve/CVE-2018-12121/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12122 page", "url": "https://www.suse.com/security/cve/CVE-2018-12122/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12123 page", "url": "https://www.suse.com/security/cve/CVE-2018-12123/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-20406 page", "url": "https://www.suse.com/security/cve/CVE-2018-20406/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-20852 page", "url": "https://www.suse.com/security/cve/CVE-2018-20852/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7158 page", "url": "https://www.suse.com/security/cve/CVE-2018-7158/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7159 page", "url": "https://www.suse.com/security/cve/CVE-2018-7159/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7160 page", "url": "https://www.suse.com/security/cve/CVE-2018-7160/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7161 page", "url": "https://www.suse.com/security/cve/CVE-2018-7161/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7167 page", "url": "https://www.suse.com/security/cve/CVE-2018-7167/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-10160 page", "url": "https://www.suse.com/security/cve/CVE-2019-10160/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11709 page", "url": "https://www.suse.com/security/cve/CVE-2019-11709/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11710 page", "url": "https://www.suse.com/security/cve/CVE-2019-11710/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11711 page", "url": "https://www.suse.com/security/cve/CVE-2019-11711/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11712 page", "url": "https://www.suse.com/security/cve/CVE-2019-11712/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11713 page", "url": "https://www.suse.com/security/cve/CVE-2019-11713/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11714 page", "url": "https://www.suse.com/security/cve/CVE-2019-11714/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11715 page", "url": "https://www.suse.com/security/cve/CVE-2019-11715/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11716 page", "url": "https://www.suse.com/security/cve/CVE-2019-11716/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11717 page", "url": "https://www.suse.com/security/cve/CVE-2019-11717/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11718 page", "url": "https://www.suse.com/security/cve/CVE-2019-11718/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11719 page", "url": "https://www.suse.com/security/cve/CVE-2019-11719/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11720 page", "url": "https://www.suse.com/security/cve/CVE-2019-11720/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11721 page", "url": "https://www.suse.com/security/cve/CVE-2019-11721/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11723 page", "url": "https://www.suse.com/security/cve/CVE-2019-11723/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11724 page", "url": "https://www.suse.com/security/cve/CVE-2019-11724/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11725 page", "url": "https://www.suse.com/security/cve/CVE-2019-11725/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11727 page", "url": "https://www.suse.com/security/cve/CVE-2019-11727/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11728 page", "url": "https://www.suse.com/security/cve/CVE-2019-11728/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11729 page", "url": "https://www.suse.com/security/cve/CVE-2019-11729/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11730 page", "url": "https://www.suse.com/security/cve/CVE-2019-11730/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11733 page", "url": "https://www.suse.com/security/cve/CVE-2019-11733/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11735 page", "url": "https://www.suse.com/security/cve/CVE-2019-11735/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11736 page", "url": "https://www.suse.com/security/cve/CVE-2019-11736/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11738 page", "url": "https://www.suse.com/security/cve/CVE-2019-11738/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11740 page", "url": "https://www.suse.com/security/cve/CVE-2019-11740/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11742 page", "url": "https://www.suse.com/security/cve/CVE-2019-11742/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11743 page", "url": "https://www.suse.com/security/cve/CVE-2019-11743/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11744 page", "url": "https://www.suse.com/security/cve/CVE-2019-11744/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11746 page", "url": "https://www.suse.com/security/cve/CVE-2019-11746/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11747 page", "url": "https://www.suse.com/security/cve/CVE-2019-11747/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11748 page", "url": "https://www.suse.com/security/cve/CVE-2019-11748/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11749 page", "url": "https://www.suse.com/security/cve/CVE-2019-11749/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11750 page", "url": "https://www.suse.com/security/cve/CVE-2019-11750/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11751 page", "url": "https://www.suse.com/security/cve/CVE-2019-11751/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11752 page", "url": "https://www.suse.com/security/cve/CVE-2019-11752/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11753 page", "url": "https://www.suse.com/security/cve/CVE-2019-11753/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11757 page", "url": "https://www.suse.com/security/cve/CVE-2019-11757/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11758 page", "url": "https://www.suse.com/security/cve/CVE-2019-11758/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11759 page", "url": "https://www.suse.com/security/cve/CVE-2019-11759/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11760 page", "url": "https://www.suse.com/security/cve/CVE-2019-11760/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11761 page", "url": "https://www.suse.com/security/cve/CVE-2019-11761/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11762 page", "url": "https://www.suse.com/security/cve/CVE-2019-11762/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11763 page", "url": "https://www.suse.com/security/cve/CVE-2019-11763/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11764 page", "url": "https://www.suse.com/security/cve/CVE-2019-11764/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13173 page", "url": "https://www.suse.com/security/cve/CVE-2019-13173/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15903 page", "url": "https://www.suse.com/security/cve/CVE-2019-15903/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5010 page", "url": "https://www.suse.com/security/cve/CVE-2019-5010/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5737 page", "url": "https://www.suse.com/security/cve/CVE-2019-5737/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9511 page", "url": "https://www.suse.com/security/cve/CVE-2019-9511/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9512 page", "url": "https://www.suse.com/security/cve/CVE-2019-9512/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9513 page", "url": "https://www.suse.com/security/cve/CVE-2019-9513/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9514 page", "url": "https://www.suse.com/security/cve/CVE-2019-9514/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9515 page", "url": "https://www.suse.com/security/cve/CVE-2019-9515/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9516 page", "url": "https://www.suse.com/security/cve/CVE-2019-9516/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9517 page", "url": "https://www.suse.com/security/cve/CVE-2019-9517/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9518 page", "url": "https://www.suse.com/security/cve/CVE-2019-9518/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9636 page", "url": "https://www.suse.com/security/cve/CVE-2019-9636/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9811 page", "url": "https://www.suse.com/security/cve/CVE-2019-9811/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9812 page", "url": "https://www.suse.com/security/cve/CVE-2019-9812/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9947 page", "url": "https://www.suse.com/security/cve/CVE-2019-9947/" } ], "title": "Security update for Mozilla Firefox", "tracking": { "current_release_date": "2020-01-17T17:07:38Z", "generator": { "date": "2020-01-17T17:07:38Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:14246-1", "initial_release_date": "2020-01-17T17:07:38Z", "revision_history": [ { "date": "2020-01-17T17:07:38Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "MozillaFirefox-68.2.0-78.51.4.x86_64", "product": { "name": "MozillaFirefox-68.2.0-78.51.4.x86_64", "product_id": "MozillaFirefox-68.2.0-78.51.4.x86_64" } }, { "category": "product_version", "name": "MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "product": { "name": "MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "product_id": "MozillaFirefox-branding-SLED-68-21.9.8.x86_64" } }, { "category": "product_version", "name": "MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "product": { "name": "MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "product_id": "MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64" } }, { "category": "product_version", "name": "MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "product": { "name": "MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "product_id": "MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64" } }, { "category": "product_version", "name": "firefox-atk-lang-2.26.1-2.8.4.x86_64", "product": { "name": "firefox-atk-lang-2.26.1-2.8.4.x86_64", "product_id": "firefox-atk-lang-2.26.1-2.8.4.x86_64" } }, { "category": "product_version", "name": "firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "product": { "name": "firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "product_id": "firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64" } }, { "category": "product_version", "name": "firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "product": { "name": "firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "product_id": "firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64" } }, { "category": "product_version", "name": "firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "product": { "name": "firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "product_id": "firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64" } }, { "category": "product_version", "name": "firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "product": { "name": "firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "product_id": "firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64" } }, { "category": "product_version", "name": "firefox-glib2-lang-2.54.3-2.14.7.x86_64", "product": { "name": "firefox-glib2-lang-2.54.3-2.14.7.x86_64", "product_id": "firefox-glib2-lang-2.54.3-2.14.7.x86_64" } }, { "category": "product_version", "name": "firefox-glib2-tools-2.54.3-2.14.7.x86_64", "product": { "name": "firefox-glib2-tools-2.54.3-2.14.7.x86_64", "product_id": "firefox-glib2-tools-2.54.3-2.14.7.x86_64" } }, { "category": "product_version", "name": "firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "product": { "name": "firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "product_id": "firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64" } }, { "category": "product_version", "name": "firefox-gtk3-data-3.10.9-2.15.3.x86_64", "product": { "name": "firefox-gtk3-data-3.10.9-2.15.3.x86_64", "product_id": "firefox-gtk3-data-3.10.9-2.15.3.x86_64" } }, { "category": "product_version", "name": "firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "product": { "name": "firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "product_id": "firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64" } }, { "category": "product_version", "name": "firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "product": { "name": "firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "product_id": "firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64" } }, { "category": "product_version", "name": "firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "product": { "name": "firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "product_id": "firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64" } }, { "category": "product_version", "name": "firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "product": { "name": "firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "product_id": "firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64" } }, { "category": "product_version", "name": "firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "product": { "name": "firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "product_id": "firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64" } }, { "category": "product_version", "name": "firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "product": { "name": "firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "product_id": "firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64" } }, { "category": "product_version", "name": "firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "product": { "name": "firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "product_id": "firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64" } }, { "category": "product_version", "name": "firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "product": { "name": "firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "product_id": "firefox-gtk3-lang-3.10.9-2.15.3.x86_64" } }, { "category": "product_version", "name": "firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "product": { "name": "firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "product_id": "firefox-gtk3-tools-3.10.9-2.15.3.x86_64" } }, { "category": "product_version", "name": "firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "product": { "name": "firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "product_id": "firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64" } }, { "category": "product_version", "name": "firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "product": { "name": "firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "product_id": "firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64" } }, { "category": "product_version", "name": "firefox-libcairo2-1.15.10-2.13.4.x86_64", "product": { "name": "firefox-libcairo2-1.15.10-2.13.4.x86_64", "product_id": "firefox-libcairo2-1.15.10-2.13.4.x86_64" } }, { "category": "product_version", "name": "firefox-libffi4-5.3.1+r233831-14.1.x86_64", "product": { "name": "firefox-libffi4-5.3.1+r233831-14.1.x86_64", "product_id": "firefox-libffi4-5.3.1+r233831-14.1.x86_64" } }, { "category": "product_version", "name": "firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "product": { "name": "firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "product_id": "firefox-libffi7-3.2.1.git259-2.3.3.x86_64" } }, { "category": "product_version", "name": "firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "product": { "name": "firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "product_id": "firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64" } }, { "category": "product_version", "name": "firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "product": { "name": "firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "product_id": "firefox-libgtk-3-0-3.10.9-2.15.3.x86_64" } }, { "category": "product_version", "name": "firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "product": { "name": "firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "product_id": "firefox-libharfbuzz0-1.7.5-2.7.4.x86_64" } }, { "category": "product_version", "name": "firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "product": { "name": "firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "product_id": "firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64" } }, { "category": "product_version", "name": "libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "product": { "name": "libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "product_id": "libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64" } }, { "category": "product_version", "name": "libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "product": { "name": "libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "product_id": "libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64" } }, { "category": "product_version", "name": "libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "product": { "name": "libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "product_id": "libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64" } }, { "category": "product_version", "name": "libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "product": { "name": "libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "product_id": "libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64" } }, { "category": "product_version", "name": "libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "product": { "name": "libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "product_id": "libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64" } }, { "category": "product_version", "name": "libfreebl3-3.45-38.9.3.x86_64", "product": { "name": "libfreebl3-3.45-38.9.3.x86_64", "product_id": "libfreebl3-3.45-38.9.3.x86_64" } }, { "category": "product_version", "name": "libfreebl3-32bit-3.45-38.9.3.x86_64", "product": { "name": "libfreebl3-32bit-3.45-38.9.3.x86_64", "product_id": "libfreebl3-32bit-3.45-38.9.3.x86_64" } }, { "category": "product_version", "name": "libsoftokn3-3.45-38.9.3.x86_64", "product": { "name": "libsoftokn3-3.45-38.9.3.x86_64", "product_id": "libsoftokn3-3.45-38.9.3.x86_64" } }, { "category": "product_version", "name": "libsoftokn3-32bit-3.45-38.9.3.x86_64", "product": { "name": "libsoftokn3-32bit-3.45-38.9.3.x86_64", "product_id": "libsoftokn3-32bit-3.45-38.9.3.x86_64" } }, { "category": "product_version", "name": "mozilla-nspr-4.21-29.6.1.x86_64", "product": { "name": "mozilla-nspr-4.21-29.6.1.x86_64", "product_id": "mozilla-nspr-4.21-29.6.1.x86_64" } }, { "category": "product_version", "name": "mozilla-nspr-32bit-4.21-29.6.1.x86_64", "product": { "name": "mozilla-nspr-32bit-4.21-29.6.1.x86_64", "product_id": "mozilla-nspr-32bit-4.21-29.6.1.x86_64" } }, { "category": "product_version", "name": "mozilla-nspr-devel-4.21-29.6.1.x86_64", "product": { "name": "mozilla-nspr-devel-4.21-29.6.1.x86_64", "product_id": "mozilla-nspr-devel-4.21-29.6.1.x86_64" } }, { "category": "product_version", "name": "mozilla-nss-3.45-38.9.3.x86_64", "product": { "name": "mozilla-nss-3.45-38.9.3.x86_64", "product_id": "mozilla-nss-3.45-38.9.3.x86_64" } }, { "category": "product_version", "name": "mozilla-nss-32bit-3.45-38.9.3.x86_64", "product": { "name": "mozilla-nss-32bit-3.45-38.9.3.x86_64", "product_id": "mozilla-nss-32bit-3.45-38.9.3.x86_64" } }, { "category": "product_version", "name": "mozilla-nss-certs-3.45-38.9.3.x86_64", "product": { "name": "mozilla-nss-certs-3.45-38.9.3.x86_64", "product_id": "mozilla-nss-certs-3.45-38.9.3.x86_64" } }, { "category": "product_version", "name": "mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "product": { "name": "mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "product_id": "mozilla-nss-certs-32bit-3.45-38.9.3.x86_64" } }, { "category": "product_version", "name": "mozilla-nss-devel-3.45-38.9.3.x86_64", "product": { "name": "mozilla-nss-devel-3.45-38.9.3.x86_64", "product_id": "mozilla-nss-devel-3.45-38.9.3.x86_64" } }, { "category": "product_version", "name": "mozilla-nss-tools-3.45-38.9.3.x86_64", "product": { "name": "mozilla-nss-tools-3.45-38.9.3.x86_64", "product_id": "mozilla-nss-tools-3.45-38.9.3.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP4-LTSS", "product": { "name": "SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles:11:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "MozillaFirefox-68.2.0-78.51.4.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64" }, "product_reference": "MozillaFirefox-68.2.0-78.51.4.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "MozillaFirefox-branding-SLED-68-21.9.8.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64" }, "product_reference": "MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64" }, "product_reference": "MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64" }, "product_reference": "MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-atk-lang-2.26.1-2.8.4.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64" }, "product_reference": "firefox-atk-lang-2.26.1-2.8.4.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64" }, "product_reference": "firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64" }, "product_reference": "firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64" }, "product_reference": "firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64" }, "product_reference": "firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-glib2-lang-2.54.3-2.14.7.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64" }, "product_reference": "firefox-glib2-lang-2.54.3-2.14.7.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-glib2-tools-2.54.3-2.14.7.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64" }, "product_reference": "firefox-glib2-tools-2.54.3-2.14.7.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64" }, "product_reference": "firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-gtk3-data-3.10.9-2.15.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64" }, "product_reference": "firefox-gtk3-data-3.10.9-2.15.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64" }, "product_reference": "firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64" }, "product_reference": "firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64" }, "product_reference": "firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64" }, "product_reference": "firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64" }, "product_reference": "firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64" }, "product_reference": "firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64" }, "product_reference": "firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-gtk3-lang-3.10.9-2.15.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64" }, "product_reference": "firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-gtk3-tools-3.10.9-2.15.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64" }, "product_reference": "firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64" }, "product_reference": "firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64" }, "product_reference": "firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-libcairo2-1.15.10-2.13.4.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64" }, "product_reference": "firefox-libcairo2-1.15.10-2.13.4.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-libffi4-5.3.1+r233831-14.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64" }, "product_reference": "firefox-libffi4-5.3.1+r233831-14.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-libffi7-3.2.1.git259-2.3.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64" }, "product_reference": "firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64" }, "product_reference": "firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-libgtk-3-0-3.10.9-2.15.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64" }, "product_reference": "firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-libharfbuzz0-1.7.5-2.7.4.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64" }, "product_reference": "firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64" }, "product_reference": "firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64" }, "product_reference": "libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64" }, "product_reference": "libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64" }, "product_reference": "libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64" }, "product_reference": "libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64" }, "product_reference": "libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libfreebl3-3.45-38.9.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64" }, "product_reference": "libfreebl3-3.45-38.9.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libfreebl3-32bit-3.45-38.9.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64" }, "product_reference": "libfreebl3-32bit-3.45-38.9.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libsoftokn3-3.45-38.9.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64" }, "product_reference": "libsoftokn3-3.45-38.9.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libsoftokn3-32bit-3.45-38.9.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64" }, "product_reference": "libsoftokn3-32bit-3.45-38.9.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "mozilla-nspr-4.21-29.6.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64" }, "product_reference": "mozilla-nspr-4.21-29.6.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "mozilla-nspr-32bit-4.21-29.6.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64" }, "product_reference": "mozilla-nspr-32bit-4.21-29.6.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "mozilla-nspr-devel-4.21-29.6.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64" }, "product_reference": "mozilla-nspr-devel-4.21-29.6.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "mozilla-nss-3.45-38.9.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64" }, "product_reference": "mozilla-nss-3.45-38.9.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "mozilla-nss-32bit-3.45-38.9.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64" }, "product_reference": "mozilla-nss-32bit-3.45-38.9.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "mozilla-nss-certs-3.45-38.9.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64" }, "product_reference": "mozilla-nss-certs-3.45-38.9.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "mozilla-nss-certs-32bit-3.45-38.9.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64" }, "product_reference": "mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "mozilla-nss-devel-3.45-38.9.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64" }, "product_reference": "mozilla-nss-devel-3.45-38.9.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "mozilla-nss-tools-3.45-38.9.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" }, "product_reference": "mozilla-nss-tools-3.45-38.9.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2013-2882", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-2882" } ], "notes": [ { "category": "general", "text": "Google V8, as used in Google Chrome before 28.0.1500.95, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that leverage \"type confusion.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-2882", "url": "https://www.suse.com/security/cve/CVE-2013-2882" }, { "category": "external", "summary": "SUSE Bug 833343 for CVE-2013-2882", "url": "https://bugzilla.suse.com/833343" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2013-2882" }, { "cve": "CVE-2013-6639", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6639" } ], "notes": [ { "category": "general", "text": "The DehoistArrayIndex function in hydrogen-dehoist.cc (aka hydrogen.cc) in Google V8 before 3.22.24.7, as used in Google Chrome before 31.0.1650.63, allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via JavaScript code that sets the value of an array element with a crafted index.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6639", "url": "https://www.suse.com/security/cve/CVE-2013-6639" }, { "category": "external", "summary": "SUSE Bug 854473 for CVE-2013-6639", "url": "https://bugzilla.suse.com/854473" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2013-6639" }, { "cve": "CVE-2013-6640", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6640" } ], "notes": [ { "category": "general", "text": "The DehoistArrayIndex function in hydrogen-dehoist.cc (aka hydrogen.cc) in Google V8 before 3.22.24.7, as used in Google Chrome before 31.0.1650.63, allows remote attackers to cause a denial of service (out-of-bounds read) via JavaScript code that sets a variable to the value of an array element with a crafted index.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6640", "url": "https://www.suse.com/security/cve/CVE-2013-6640" }, { "category": "external", "summary": "SUSE Bug 854473 for CVE-2013-6640", "url": "https://bugzilla.suse.com/854473" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2013-6640" }, { "cve": "CVE-2013-6668", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6668" } ], "notes": [ { "category": "general", "text": "Multiple unspecified vulnerabilities in Google V8 before 3.24.35.10, as used in Google Chrome before 33.0.1750.146, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6668", "url": "https://www.suse.com/security/cve/CVE-2013-6668" }, { "category": "external", "summary": "SUSE Bug 866959 for CVE-2013-6668", "url": "https://bugzilla.suse.com/866959" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2013-6668" }, { "cve": "CVE-2014-0224", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0224" } ], "notes": [ { "category": "general", "text": "OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the \"CCS Injection\" vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0224", "url": "https://www.suse.com/security/cve/CVE-2014-0224" }, { "category": "external", "summary": "SUSE Bug 1146657 for CVE-2014-0224", "url": "https://bugzilla.suse.com/1146657" }, { "category": "external", "summary": "SUSE Bug 880891 for CVE-2014-0224", "url": "https://bugzilla.suse.com/880891" }, { "category": "external", "summary": "SUSE Bug 881743 for CVE-2014-0224", "url": "https://bugzilla.suse.com/881743" }, { "category": "external", "summary": "SUSE Bug 883126 for CVE-2014-0224", "url": "https://bugzilla.suse.com/883126" }, { "category": "external", "summary": "SUSE Bug 885777 for CVE-2014-0224", "url": "https://bugzilla.suse.com/885777" }, { "category": "external", "summary": "SUSE Bug 892403 for CVE-2014-0224", "url": "https://bugzilla.suse.com/892403" }, { "category": "external", "summary": "SUSE Bug 901237 for CVE-2014-0224", "url": "https://bugzilla.suse.com/901237" }, { "category": "external", "summary": "SUSE Bug 903703 for CVE-2014-0224", "url": "https://bugzilla.suse.com/903703" }, { "category": "external", "summary": "SUSE Bug 905018 for CVE-2014-0224", "url": "https://bugzilla.suse.com/905018" }, { "category": "external", "summary": "SUSE Bug 905106 for CVE-2014-0224", "url": "https://bugzilla.suse.com/905106" }, { "category": "external", "summary": "SUSE Bug 914447 for CVE-2014-0224", "url": "https://bugzilla.suse.com/914447" }, { "category": "external", "summary": "SUSE Bug 915913 for CVE-2014-0224", "url": "https://bugzilla.suse.com/915913" }, { "category": "external", "summary": "SUSE Bug 916239 for CVE-2014-0224", "url": "https://bugzilla.suse.com/916239" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2014-0224" }, { "cve": "CVE-2015-3193", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-3193" } ], "notes": [ { "category": "general", "text": "The Montgomery squaring implementation in crypto/bn/asm/x86_64-mont5.pl in OpenSSL 1.0.2 before 1.0.2e on the x86_64 platform, as used by the BN_mod_exp function, mishandles carry propagation and produces incorrect output, which makes it easier for remote attackers to obtain sensitive private-key information via an attack against use of a (1) Diffie-Hellman (DH) or (2) Diffie-Hellman Ephemeral (DHE) ciphersuite.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-3193", "url": "https://www.suse.com/security/cve/CVE-2015-3193" }, { "category": "external", "summary": "SUSE Bug 1022086 for CVE-2015-3193", "url": "https://bugzilla.suse.com/1022086" }, { "category": "external", "summary": "SUSE Bug 1066242 for CVE-2015-3193", "url": "https://bugzilla.suse.com/1066242" }, { "category": "external", "summary": "SUSE Bug 1071906 for CVE-2015-3193", "url": "https://bugzilla.suse.com/1071906" }, { "category": "external", "summary": "SUSE Bug 957814 for CVE-2015-3193", "url": "https://bugzilla.suse.com/957814" }, { "category": "external", "summary": "SUSE Bug 960151 for CVE-2015-3193", "url": "https://bugzilla.suse.com/960151" }, { "category": "external", "summary": "SUSE Bug 990370 for CVE-2015-3193", "url": "https://bugzilla.suse.com/990370" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2015-3193" }, { "cve": "CVE-2015-3194", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-3194" } ], "notes": [ { "category": "general", "text": "crypto/rsa/rsa_ameth.c in OpenSSL 1.0.1 before 1.0.1q and 1.0.2 before 1.0.2e allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an RSA PSS ASN.1 signature that lacks a mask generation function parameter.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-3194", "url": "https://www.suse.com/security/cve/CVE-2015-3194" }, { "category": "external", "summary": "SUSE Bug 957812 for CVE-2015-3194", "url": "https://bugzilla.suse.com/957812" }, { "category": "external", "summary": "SUSE Bug 957815 for CVE-2015-3194", "url": "https://bugzilla.suse.com/957815" }, { "category": "external", "summary": "SUSE Bug 958768 for CVE-2015-3194", "url": "https://bugzilla.suse.com/958768" }, { "category": "external", "summary": "SUSE Bug 976341 for CVE-2015-3194", "url": "https://bugzilla.suse.com/976341" }, { "category": "external", "summary": "SUSE Bug 990370 for CVE-2015-3194", "url": "https://bugzilla.suse.com/990370" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2015-3194" }, { "cve": "CVE-2015-5380", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5380" } ], "notes": [ { "category": "general", "text": "The Utf8DecoderBase::WriteUtf16Slow function in unicode-decoder.cc in Google V8, as used in Node.js before 0.12.6, io.js before 1.8.3 and 2.x before 2.3.3, and other products, does not verify that there is memory available for a UTF-16 surrogate pair, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted byte sequence.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5380", "url": "https://www.suse.com/security/cve/CVE-2015-5380" }, { "category": "external", "summary": "SUSE Bug 937414 for CVE-2015-5380", "url": "https://bugzilla.suse.com/937414" }, { "category": "external", "summary": "SUSE Bug 937416 for CVE-2015-5380", "url": "https://bugzilla.suse.com/937416" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2015-5380" }, { "cve": "CVE-2015-7384", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7384" } ], "notes": [ { "category": "general", "text": "Node.js 4.0.0, 4.1.0, and 4.1.1 allows remote attackers to cause a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7384", "url": "https://www.suse.com/security/cve/CVE-2015-7384" }, { "category": "external", "summary": "SUSE Bug 948602 for CVE-2015-7384", "url": "https://bugzilla.suse.com/948602" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2015-7384" }, { "cve": "CVE-2016-2086", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2086" } ], "notes": [ { "category": "general", "text": "Node.js 0.10.x before 0.10.42, 0.12.x before 0.12.10, 4.x before 4.3.0, and 5.x before 5.6.0 allow remote attackers to conduct HTTP request smuggling attacks via a crafted Content-Length HTTP header.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2086", "url": "https://www.suse.com/security/cve/CVE-2016-2086" }, { "category": "external", "summary": "SUSE Bug 966076 for CVE-2016-2086", "url": "https://bugzilla.suse.com/966076" }, { "category": "external", "summary": "SUSE Bug 966077 for CVE-2016-2086", "url": "https://bugzilla.suse.com/966077" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2016-2086" }, { "cve": "CVE-2016-2178", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2178" } ], "notes": [ { "category": "general", "text": "The dsa_sign_setup function in crypto/dsa/dsa_ossl.c in OpenSSL through 1.0.2h does not properly ensure the use of constant-time operations, which makes it easier for local users to discover a DSA private key via a timing side-channel attack.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2178", "url": "https://www.suse.com/security/cve/CVE-2016-2178" }, { "category": "external", "summary": "SUSE Bug 1004104 for CVE-2016-2178", "url": "https://bugzilla.suse.com/1004104" }, { "category": "external", "summary": "SUSE Bug 983249 for CVE-2016-2178", "url": "https://bugzilla.suse.com/983249" }, { "category": "external", "summary": "SUSE Bug 983519 for CVE-2016-2178", "url": "https://bugzilla.suse.com/983519" }, { "category": "external", "summary": "SUSE Bug 999665 for CVE-2016-2178", "url": "https://bugzilla.suse.com/999665" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "low" } ], "title": "CVE-2016-2178" }, { "cve": "CVE-2016-2183", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2183" } ], "notes": [ { "category": "general", "text": "The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a \"Sweet32\" attack.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2183", "url": "https://www.suse.com/security/cve/CVE-2016-2183" }, { "category": "external", "summary": "SUSE Bug 1001912 for CVE-2016-2183", "url": "https://bugzilla.suse.com/1001912" }, { "category": "external", "summary": "SUSE Bug 1024218 for CVE-2016-2183", "url": "https://bugzilla.suse.com/1024218" }, { "category": "external", "summary": "SUSE Bug 1027038 for CVE-2016-2183", "url": "https://bugzilla.suse.com/1027038" }, { "category": "external", "summary": "SUSE Bug 1034689 for CVE-2016-2183", "url": "https://bugzilla.suse.com/1034689" }, { "category": "external", "summary": "SUSE Bug 1056614 for CVE-2016-2183", "url": "https://bugzilla.suse.com/1056614" }, { "category": "external", "summary": "SUSE Bug 1171693 for CVE-2016-2183", "url": "https://bugzilla.suse.com/1171693" }, { "category": "external", "summary": "SUSE Bug 994844 for CVE-2016-2183", "url": "https://bugzilla.suse.com/994844" }, { "category": "external", "summary": "SUSE Bug 995359 for CVE-2016-2183", "url": "https://bugzilla.suse.com/995359" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2016-2183" }, { "cve": "CVE-2016-2216", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2216" } ], "notes": [ { "category": "general", "text": "The HTTP header parsing code in Node.js 0.10.x before 0.10.42, 0.11.6 through 0.11.16, 0.12.x before 0.12.10, 4.x before 4.3.0, and 5.x before 5.6.0 allows remote attackers to bypass an HTTP response-splitting protection mechanism via UTF-8 encoded Unicode characters in the HTTP header, as demonstrated by %c4%8d%c4%8a.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2216", "url": "https://www.suse.com/security/cve/CVE-2016-2216" }, { "category": "external", "summary": "SUSE Bug 966076 for CVE-2016-2216", "url": "https://bugzilla.suse.com/966076" }, { "category": "external", "summary": "SUSE Bug 966077 for CVE-2016-2216", "url": "https://bugzilla.suse.com/966077" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2016-2216" }, { "cve": "CVE-2016-5172", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5172" } ], "notes": [ { "category": "general", "text": "The parser in Google V8, as used in Google Chrome before 53.0.2785.113, mishandles scopes, which allows remote attackers to obtain sensitive information from arbitrary memory locations via crafted JavaScript code.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5172", "url": "https://www.suse.com/security/cve/CVE-2016-5172" }, { "category": "external", "summary": "SUSE Bug 998743 for CVE-2016-5172", "url": "https://bugzilla.suse.com/998743" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2016-5172" }, { "cve": "CVE-2016-5325", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5325" } ], "notes": [ { "category": "general", "text": "CRLF injection vulnerability in the ServerResponse#writeHead function in Node.js 0.10.x before 0.10.47, 0.12.x before 0.12.16, 4.x before 4.6.0, and 6.x before 6.7.0 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via the reason argument.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5325", "url": "https://www.suse.com/security/cve/CVE-2016-5325" }, { "category": "external", "summary": "SUSE Bug 985201 for CVE-2016-5325", "url": "https://bugzilla.suse.com/985201" }, { "category": "external", "summary": "SUSE Bug 985202 for CVE-2016-5325", "url": "https://bugzilla.suse.com/985202" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "low" } ], "title": "CVE-2016-5325" }, { "cve": "CVE-2016-6304", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6304" } ], "notes": [ { "category": "general", "text": "Multiple memory leaks in t1_lib.c in OpenSSL before 1.0.1u, 1.0.2 before 1.0.2i, and 1.1.0 before 1.1.0a allow remote attackers to cause a denial of service (memory consumption) via large OCSP Status Request extensions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6304", "url": "https://www.suse.com/security/cve/CVE-2016-6304" }, { "category": "external", "summary": "SUSE Bug 1001706 for CVE-2016-6304", "url": "https://bugzilla.suse.com/1001706" }, { "category": "external", "summary": "SUSE Bug 1003811 for CVE-2016-6304", "url": "https://bugzilla.suse.com/1003811" }, { "category": "external", "summary": "SUSE Bug 1004104 for CVE-2016-6304", "url": "https://bugzilla.suse.com/1004104" }, { "category": "external", "summary": "SUSE Bug 1005579 for CVE-2016-6304", "url": "https://bugzilla.suse.com/1005579" }, { "category": "external", "summary": "SUSE Bug 1021375 for CVE-2016-6304", "url": "https://bugzilla.suse.com/1021375" }, { "category": "external", "summary": "SUSE Bug 999665 for CVE-2016-6304", "url": "https://bugzilla.suse.com/999665" }, { "category": "external", "summary": "SUSE Bug 999666 for CVE-2016-6304", "url": "https://bugzilla.suse.com/999666" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2016-6304" }, { "cve": "CVE-2016-6306", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6306" } ], "notes": [ { "category": "general", "text": "The certificate parser in OpenSSL before 1.0.1u and 1.0.2 before 1.0.2i might allow remote attackers to cause a denial of service (out-of-bounds read) via crafted certificate operations, related to s3_clnt.c and s3_srvr.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6306", "url": "https://www.suse.com/security/cve/CVE-2016-6306" }, { "category": "external", "summary": "SUSE Bug 1004104 for CVE-2016-6306", "url": "https://bugzilla.suse.com/1004104" }, { "category": "external", "summary": "SUSE Bug 999665 for CVE-2016-6306", "url": "https://bugzilla.suse.com/999665" }, { "category": "external", "summary": "SUSE Bug 999668 for CVE-2016-6306", "url": "https://bugzilla.suse.com/999668" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "low" } ], "title": "CVE-2016-6306" }, { "cve": "CVE-2016-7052", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7052" } ], "notes": [ { "category": "general", "text": "crypto/x509/x509_vfy.c in OpenSSL 1.0.2i allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) by triggering a CRL operation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7052", "url": "https://www.suse.com/security/cve/CVE-2016-7052" }, { "category": "external", "summary": "SUSE Bug 1001148 for CVE-2016-7052", "url": "https://bugzilla.suse.com/1001148" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2016-7052" }, { "cve": "CVE-2016-7099", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7099" } ], "notes": [ { "category": "general", "text": "The tls.checkServerIdentity function in Node.js 0.10.x before 0.10.47, 0.12.x before 0.12.16, 4.x before 4.6.0, and 6.x before 6.7.0 does not properly handle wildcards in name fields of X.509 certificates, which allows man-in-the-middle attackers to spoof servers via a crafted certificate.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7099", "url": "https://www.suse.com/security/cve/CVE-2016-7099" }, { "category": "external", "summary": "SUSE Bug 1001652 for CVE-2016-7099", "url": "https://bugzilla.suse.com/1001652" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2016-7099" }, { "cve": "CVE-2017-1000381", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-1000381" } ], "notes": [ { "category": "general", "text": "The c-ares function `ares_parse_naptr_reply()`, which is used for parsing NAPTR responses, could be triggered to read memory outside of the given input buffer if the passed in DNS response packet was crafted in a particular way.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-1000381", "url": "https://www.suse.com/security/cve/CVE-2017-1000381" }, { "category": "external", "summary": "SUSE Bug 1044946 for CVE-2017-1000381", "url": "https://bugzilla.suse.com/1044946" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2017-1000381" }, { "cve": "CVE-2017-10686", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-10686" } ], "notes": [ { "category": "general", "text": "In Netwide Assembler (NASM) 2.14rc0, there are multiple heap use after free vulnerabilities in the tool nasm. The related heap is allocated in the token() function and freed in the detoken() function (called by pp_getline()) - it is used again at multiple positions later that could cause multiple damages. For example, it causes a corrupted double-linked list in detoken(), a double free or corruption in delete_Token(), and an out-of-bounds write in detoken(). It has a high possibility to lead to a remote code execution attack.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-10686", "url": "https://www.suse.com/security/cve/CVE-2017-10686" }, { "category": "external", "summary": "SUSE Bug 1047936 for CVE-2017-10686", "url": "https://bugzilla.suse.com/1047936" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2017-10686" }, { "cve": "CVE-2017-11111", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-11111" } ], "notes": [ { "category": "general", "text": "In Netwide Assembler (NASM) 2.14rc0, preproc.c allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-11111", "url": "https://www.suse.com/security/cve/CVE-2017-11111" }, { "category": "external", "summary": "SUSE Bug 1047925 for CVE-2017-11111", "url": "https://bugzilla.suse.com/1047925" }, { "category": "external", "summary": "SUSE Bug 1073798 for CVE-2017-11111", "url": "https://bugzilla.suse.com/1073798" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2017-11111" }, { "cve": "CVE-2017-11499", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-11499" } ], "notes": [ { "category": "general", "text": "Node.js v4.0 through v4.8.3, all versions of v5.x, v6.0 through v6.11.0, v7.0 through v7.10.0, and v8.0 through v8.1.3 was susceptible to hash flooding remote DoS attacks as the HashTable seed was constant across a given released version of Node.js. This was a result of building with V8 snapshots enabled by default which caused the initially randomized seed to be overwritten on startup.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-11499", "url": "https://www.suse.com/security/cve/CVE-2017-11499" }, { "category": "external", "summary": "SUSE Bug 1044849 for CVE-2017-11499", "url": "https://bugzilla.suse.com/1044849" }, { "category": "external", "summary": "SUSE Bug 1048299 for CVE-2017-11499", "url": "https://bugzilla.suse.com/1048299" }, { "category": "external", "summary": "SUSE Bug 1051117 for CVE-2017-11499", "url": "https://bugzilla.suse.com/1051117" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2017-11499" }, { "cve": "CVE-2017-14228", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-14228" } ], "notes": [ { "category": "general", "text": "In Netwide Assembler (NASM) 2.14rc0, there is an illegal address access in the function paste_tokens() in preproc.c, aka a NULL pointer dereference. It will lead to remote denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-14228", "url": "https://www.suse.com/security/cve/CVE-2017-14228" }, { "category": "external", "summary": "SUSE Bug 1058013 for CVE-2017-14228", "url": "https://bugzilla.suse.com/1058013" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2017-14228" }, { "cve": "CVE-2017-14849", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-14849" } ], "notes": [ { "category": "general", "text": "Node.js 8.5.0 before 8.6.0 allows remote attackers to access unintended files, because a change to \"..\" handling was incompatible with the pathname validation used by unspecified community modules.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-14849", "url": "https://www.suse.com/security/cve/CVE-2017-14849" }, { "category": "external", "summary": "SUSE Bug 1060820 for CVE-2017-14849", "url": "https://bugzilla.suse.com/1060820" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2017-14849" }, { "cve": "CVE-2017-14919", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-14919" } ], "notes": [ { "category": "general", "text": "Node.js before 4.8.5, 6.x before 6.11.5, and 8.x before 8.8.0 allows remote attackers to cause a denial of service (uncaught exception and crash) by leveraging a change in the zlib module 1.2.9 making 8 an invalid value for the windowBits parameter.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-14919", "url": "https://www.suse.com/security/cve/CVE-2017-14919" }, { "category": "external", "summary": "SUSE Bug 1059050 for CVE-2017-14919", "url": "https://bugzilla.suse.com/1059050" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2017-14919" }, { "cve": "CVE-2017-15896", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-15896" } ], "notes": [ { "category": "general", "text": "Node.js was affected by OpenSSL vulnerability CVE-2017-3737 in regards to the use of SSL_read() due to TLS handshake failure. The result was that an active network attacker could send application data to Node.js using the TLS or HTTP2 modules in a way that bypassed TLS authentication and encryption.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-15896", "url": "https://www.suse.com/security/cve/CVE-2017-15896" }, { "category": "external", "summary": "SUSE Bug 1071905 for CVE-2017-15896", "url": "https://bugzilla.suse.com/1071905" }, { "category": "external", "summary": "SUSE Bug 1072322 for CVE-2017-15896", "url": "https://bugzilla.suse.com/1072322" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2017-15896" }, { "cve": "CVE-2017-15897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-15897" } ], "notes": [ { "category": "general", "text": "Node.js had a bug in versions 8.X and 9.X which caused buffers to not be initialized when the encoding for the fill value did not match the encoding specified. For example, \u0027Buffer.alloc(0x100, \"This is not correctly encoded\", \"hex\");\u0027 The buffer implementation was updated such that the buffer will be initialized to all zeros in these cases.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-15897", "url": "https://www.suse.com/security/cve/CVE-2017-15897" }, { "category": "external", "summary": "SUSE Bug 1072320 for CVE-2017-15897", "url": "https://bugzilla.suse.com/1072320" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2017-15897" }, { "cve": "CVE-2017-17810", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17810" } ], "notes": [ { "category": "general", "text": "In Netwide Assembler (NASM) 2.14rc0, there is a \"SEGV on unknown address\" that will cause a remote denial of service attack, because asm/preproc.c mishandles macro calls that have the wrong number of arguments.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17810", "url": "https://www.suse.com/security/cve/CVE-2017-17810" }, { "category": "external", "summary": "SUSE Bug 1073796 for CVE-2017-17810", "url": "https://bugzilla.suse.com/1073796" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "low" } ], "title": "CVE-2017-17810" }, { "cve": "CVE-2017-17811", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17811" } ], "notes": [ { "category": "general", "text": "In Netwide Assembler (NASM) 2.14rc0, there is a heap-based buffer overflow that will cause a remote denial of service attack, related to a strcpy in paste_tokens in asm/preproc.c, a similar issue to CVE-2017-11111.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17811", "url": "https://www.suse.com/security/cve/CVE-2017-17811" }, { "category": "external", "summary": "SUSE Bug 1073798 for CVE-2017-17811", "url": "https://bugzilla.suse.com/1073798" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "low" } ], "title": "CVE-2017-17811" }, { "cve": "CVE-2017-17812", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17812" } ], "notes": [ { "category": "general", "text": "In Netwide Assembler (NASM) 2.14rc0, there is a heap-based buffer over-read in the function detoken() in asm/preproc.c that will cause a remote denial of service attack.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17812", "url": "https://www.suse.com/security/cve/CVE-2017-17812" }, { "category": "external", "summary": "SUSE Bug 1073799 for CVE-2017-17812", "url": "https://bugzilla.suse.com/1073799" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "low" } ], "title": "CVE-2017-17812" }, { "cve": "CVE-2017-17813", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17813" } ], "notes": [ { "category": "general", "text": "In Netwide Assembler (NASM) 2.14rc0, there is a use-after-free in the pp_list_one_macro function in asm/preproc.c that will cause a remote denial of service attack, related to mishandling of line-syntax errors.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17813", "url": "https://www.suse.com/security/cve/CVE-2017-17813" }, { "category": "external", "summary": "SUSE Bug 1073803 for CVE-2017-17813", "url": "https://bugzilla.suse.com/1073803" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "low" } ], "title": "CVE-2017-17813" }, { "cve": "CVE-2017-17814", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17814" } ], "notes": [ { "category": "general", "text": "In Netwide Assembler (NASM) 2.14rc0, there is a use-after-free in do_directive in asm/preproc.c that will cause a remote denial of service attack.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17814", "url": "https://www.suse.com/security/cve/CVE-2017-17814" }, { "category": "external", "summary": "SUSE Bug 1073808 for CVE-2017-17814", "url": "https://bugzilla.suse.com/1073808" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "low" } ], "title": "CVE-2017-17814" }, { "cve": "CVE-2017-17815", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17815" } ], "notes": [ { "category": "general", "text": "In Netwide Assembler (NASM) 2.14rc0, there is an illegal address access in is_mmacro() in asm/preproc.c that will cause a remote denial of service attack, because of a missing check for the relationship between minimum and maximum parameter counts.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17815", "url": "https://www.suse.com/security/cve/CVE-2017-17815" }, { "category": "external", "summary": "SUSE Bug 1073818 for CVE-2017-17815", "url": "https://bugzilla.suse.com/1073818" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "low" } ], "title": "CVE-2017-17815" }, { "cve": "CVE-2017-17816", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17816" } ], "notes": [ { "category": "general", "text": "In Netwide Assembler (NASM) 2.14rc0, there is a use-after-free in pp_getline in asm/preproc.c that will cause a remote denial of service attack.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17816", "url": "https://www.suse.com/security/cve/CVE-2017-17816" }, { "category": "external", "summary": "SUSE Bug 1073823 for CVE-2017-17816", "url": "https://bugzilla.suse.com/1073823" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "low" } ], "title": "CVE-2017-17816" }, { "cve": "CVE-2017-17817", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17817" } ], "notes": [ { "category": "general", "text": "In Netwide Assembler (NASM) 2.14rc0, there is a use-after-free in pp_verror in asm/preproc.c that will cause a remote denial of service attack.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17817", "url": "https://www.suse.com/security/cve/CVE-2017-17817" }, { "category": "external", "summary": "SUSE Bug 1073829 for CVE-2017-17817", "url": "https://bugzilla.suse.com/1073829" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "low" } ], "title": "CVE-2017-17817" }, { "cve": "CVE-2017-17818", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17818" } ], "notes": [ { "category": "general", "text": "In Netwide Assembler (NASM) 2.14rc0, there is a heap-based buffer over-read that will cause a remote denial of service attack, related to a while loop in paste_tokens in asm/preproc.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17818", "url": "https://www.suse.com/security/cve/CVE-2017-17818" }, { "category": "external", "summary": "SUSE Bug 1073830 for CVE-2017-17818", "url": "https://bugzilla.suse.com/1073830" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "low" } ], "title": "CVE-2017-17818" }, { "cve": "CVE-2017-17819", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17819" } ], "notes": [ { "category": "general", "text": "In Netwide Assembler (NASM) 2.14rc0, there is an illegal address access in the function find_cc() in asm/preproc.c that will cause a remote denial of service attack, because pointers associated with skip_white_ calls are not validated.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17819", "url": "https://www.suse.com/security/cve/CVE-2017-17819" }, { "category": "external", "summary": "SUSE Bug 1073832 for CVE-2017-17819", "url": "https://bugzilla.suse.com/1073832" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "low" } ], "title": "CVE-2017-17819" }, { "cve": "CVE-2017-17820", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17820" } ], "notes": [ { "category": "general", "text": "In Netwide Assembler (NASM) 2.14rc0, there is a use-after-free in pp_list_one_macro in asm/preproc.c that will lead to a remote denial of service attack, related to mishandling of operand-type errors.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17820", "url": "https://www.suse.com/security/cve/CVE-2017-17820" }, { "category": "external", "summary": "SUSE Bug 1073846 for CVE-2017-17820", "url": "https://bugzilla.suse.com/1073846" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "low" } ], "title": "CVE-2017-17820" }, { "cve": "CVE-2017-18207", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-18207" } ], "notes": [ { "category": "general", "text": "The Wave_read._read_fmt_chunk function in Lib/wave.py in Python through 3.6.4 does not ensure a nonzero channel value, which allows attackers to cause a denial of service (divide-by-zero and exception) via a crafted wav format audio file. NOTE: the vendor disputes this issue because Python applications \"need to be prepared to handle a wide variety of exceptions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-18207", "url": "https://www.suse.com/security/cve/CVE-2017-18207" }, { "category": "external", "summary": "SUSE Bug 1083507 for CVE-2017-18207", "url": "https://bugzilla.suse.com/1083507" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2017-18207" }, { "cve": "CVE-2017-3735", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-3735" } ], "notes": [ { "category": "general", "text": "While parsing an IPAddressFamily extension in an X.509 certificate, it is possible to do a one-byte overread. This would result in an incorrect text display of the certificate. This bug has been present since 2006 and is present in all versions of OpenSSL before 1.0.2m and 1.1.0g.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-3735", "url": "https://www.suse.com/security/cve/CVE-2017-3735" }, { "category": "external", "summary": "SUSE Bug 1056058 for CVE-2017-3735", "url": "https://bugzilla.suse.com/1056058" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2017-3735" }, { "cve": "CVE-2017-3736", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-3736" } ], "notes": [ { "category": "general", "text": "There is a carry propagating bug in the x86_64 Montgomery squaring procedure in OpenSSL before 1.0.2m and 1.1.0 before 1.1.0g. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH are considered just feasible (although very difficult) because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be very significant and likely only accessible to a limited number of attackers. An attacker would additionally need online access to an unpatched system using the target private key in a scenario with persistent DH parameters and a private key that is shared between multiple clients. This only affects processors that support the BMI1, BMI2 and ADX extensions like Intel Broadwell (5th generation) and later or AMD Ryzen.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-3736", "url": "https://www.suse.com/security/cve/CVE-2017-3736" }, { "category": "external", "summary": "SUSE Bug 1066242 for CVE-2017-3736", "url": "https://bugzilla.suse.com/1066242" }, { "category": "external", "summary": "SUSE Bug 1071906 for CVE-2017-3736", "url": "https://bugzilla.suse.com/1071906" }, { "category": "external", "summary": "SUSE Bug 1076369 for CVE-2017-3736", "url": "https://bugzilla.suse.com/1076369" }, { "category": "external", "summary": "SUSE Bug 957814 for CVE-2017-3736", "url": "https://bugzilla.suse.com/957814" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2017-3736" }, { "cve": "CVE-2017-3738", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-3738" } ], "notes": [ { "category": "general", "text": "There is an overflow bug in the AVX2 Montgomery multiplication procedure used in exponentiation with 1024-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH1024 are considered just feasible, because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be significant. However, for an attack on TLS to be meaningful, the server would have to share the DH1024 private key among multiple clients, which is no longer an option since CVE-2016-0701. This only affects processors that support the AVX2 but not ADX extensions like Intel Haswell (4th generation). Note: The impact from this issue is similar to CVE-2017-3736, CVE-2017-3732 and CVE-2015-3193. OpenSSL version 1.0.2-1.0.2m and 1.1.0-1.1.0g are affected. Fixed in OpenSSL 1.0.2n. Due to the low severity of this issue we are not issuing a new release of OpenSSL 1.1.0 at this time. The fix will be included in OpenSSL 1.1.0h when it becomes available. The fix is also available in commit e502cc86d in the OpenSSL git repository.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-3738", "url": "https://www.suse.com/security/cve/CVE-2017-3738" }, { "category": "external", "summary": "SUSE Bug 1071906 for CVE-2017-3738", "url": "https://bugzilla.suse.com/1071906" }, { "category": "external", "summary": "SUSE Bug 1097757 for CVE-2017-3738", "url": "https://bugzilla.suse.com/1097757" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "low" } ], "title": "CVE-2017-3738" }, { "cve": "CVE-2018-0732", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-0732" } ], "notes": [ { "category": "general", "text": "During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-0732", "url": "https://www.suse.com/security/cve/CVE-2018-0732" }, { "category": "external", "summary": "SUSE Bug 1077628 for CVE-2018-0732", "url": "https://bugzilla.suse.com/1077628" }, { "category": "external", "summary": "SUSE Bug 1097158 for CVE-2018-0732", "url": "https://bugzilla.suse.com/1097158" }, { "category": "external", "summary": "SUSE Bug 1099502 for CVE-2018-0732", "url": "https://bugzilla.suse.com/1099502" }, { "category": "external", "summary": "SUSE Bug 1106692 for CVE-2018-0732", "url": "https://bugzilla.suse.com/1106692" }, { "category": "external", "summary": "SUSE Bug 1108542 for CVE-2018-0732", "url": "https://bugzilla.suse.com/1108542" }, { "category": "external", "summary": "SUSE Bug 1110163 for CVE-2018-0732", "url": "https://bugzilla.suse.com/1110163" }, { "category": "external", "summary": "SUSE Bug 1112097 for CVE-2018-0732", "url": "https://bugzilla.suse.com/1112097" }, { "category": "external", "summary": "SUSE Bug 1122198 for CVE-2018-0732", "url": "https://bugzilla.suse.com/1122198" }, { "category": "external", "summary": "SUSE Bug 1148697 for CVE-2018-0732", "url": "https://bugzilla.suse.com/1148697" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2018-0732" }, { "cve": "CVE-2018-1000168", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1000168" } ], "notes": [ { "category": "general", "text": "nghttp2 version \u003e= 1.10.0 and nghttp2 \u003c= v1.31.0 contains an Improper Input Validation CWE-20 vulnerability in ALTSVC frame handling that can result in segmentation fault leading to denial of service. This attack appears to be exploitable via network client. This vulnerability appears to have been fixed in \u003e= 1.31.1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1000168", "url": "https://www.suse.com/security/cve/CVE-2018-1000168" }, { "category": "external", "summary": "SUSE Bug 1088639 for CVE-2018-1000168", "url": "https://bugzilla.suse.com/1088639" }, { "category": "external", "summary": "SUSE Bug 1097401 for CVE-2018-1000168", "url": "https://bugzilla.suse.com/1097401" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2018-1000168" }, { "cve": "CVE-2018-12115", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12115" } ], "notes": [ { "category": "general", "text": "In all versions of Node.js prior to 6.14.4, 8.11.4 and 10.9.0 when used with UCS-2 encoding (recognized by Node.js under the names `\u0027ucs2\u0027`, `\u0027ucs-2\u0027`, `\u0027utf16le\u0027` and `\u0027utf-16le\u0027`), `Buffer#write()` can be abused to write outside of the bounds of a single `Buffer`. Writes that start from the second-to-last position of a buffer cause a miscalculation of the maximum length of the input bytes to be written.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12115", "url": "https://www.suse.com/security/cve/CVE-2018-12115" }, { "category": "external", "summary": "SUSE Bug 1105019 for CVE-2018-12115", "url": "https://bugzilla.suse.com/1105019" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2018-12115" }, { "cve": "CVE-2018-12116", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12116" } ], "notes": [ { "category": "general", "text": "Node.js: All versions prior to Node.js 6.15.0 and 8.14.0: HTTP request splitting: If Node.js can be convinced to use unsanitized user-provided Unicode data for the `path` option of an HTTP request, then data can be provided which will trigger a second, unexpected, and user-defined HTTP request to made to the same server.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12116", "url": "https://www.suse.com/security/cve/CVE-2018-12116" }, { "category": "external", "summary": "SUSE Bug 1117630 for CVE-2018-12116", "url": "https://bugzilla.suse.com/1117630" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2018-12116" }, { "cve": "CVE-2018-12121", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12121" } ], "notes": [ { "category": "general", "text": "Node.js: All versions prior to Node.js 6.15.0, 8.14.0, 10.14.0 and 11.3.0: Denial of Service with large HTTP headers: By using a combination of many requests with maximum sized headers (almost 80 KB per connection), and carefully timed completion of the headers, it is possible to cause the HTTP server to abort from heap allocation failure. Attack potential is mitigated by the use of a load balancer or other proxy layer.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12121", "url": "https://www.suse.com/security/cve/CVE-2018-12121" }, { "category": "external", "summary": "SUSE Bug 1117626 for CVE-2018-12121", "url": "https://bugzilla.suse.com/1117626" }, { "category": "external", "summary": "SUSE Bug 1127532 for CVE-2018-12121", "url": "https://bugzilla.suse.com/1127532" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2018-12121" }, { "cve": "CVE-2018-12122", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12122" } ], "notes": [ { "category": "general", "text": "Node.js: All versions prior to Node.js 6.15.0, 8.14.0, 10.14.0 and 11.3.0: Slowloris HTTP Denial of Service: An attacker can cause a Denial of Service (DoS) by sending headers very slowly keeping HTTP or HTTPS connections and associated resources alive for a long period of time.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12122", "url": "https://www.suse.com/security/cve/CVE-2018-12122" }, { "category": "external", "summary": "SUSE Bug 1117627 for CVE-2018-12122", "url": "https://bugzilla.suse.com/1117627" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2018-12122" }, { "cve": "CVE-2018-12123", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12123" } ], "notes": [ { "category": "general", "text": "Node.js: All versions prior to Node.js 6.15.0, 8.14.0, 10.14.0 and 11.3.0: Hostname spoofing in URL parser for javascript protocol: If a Node.js application is using url.parse() to determine the URL hostname, that hostname can be spoofed by using a mixed case \"javascript:\" (e.g. \"javAscript:\") protocol (other protocols are not affected). If security decisions are made about the URL based on the hostname, they may be incorrect.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12123", "url": "https://www.suse.com/security/cve/CVE-2018-12123" }, { "category": "external", "summary": "SUSE Bug 1117629 for CVE-2018-12123", "url": "https://bugzilla.suse.com/1117629" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2018-12123" }, { "cve": "CVE-2018-20406", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-20406" } ], "notes": [ { "category": "general", "text": "Modules/_pickle.c in Python before 3.7.1 has an integer overflow via a large LONG_BINPUT value that is mishandled during a \"resize to twice the size\" attempt. This issue might cause memory exhaustion, but is only relevant if the pickle format is used for serializing tens or hundreds of gigabytes of data. This issue is fixed in: v3.4.10, v3.4.10rc1; v3.5.10, v3.5.10rc1, v3.5.7, v3.5.7rc1, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.7, v3.6.7rc1, v3.6.7rc2, v3.6.8, v3.6.8rc1, v3.6.9, v3.6.9rc1; v3.7.1, v3.7.1rc1, v3.7.1rc2, v3.7.2, v3.7.2rc1, v3.7.3, v3.7.3rc1, v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-20406", "url": "https://www.suse.com/security/cve/CVE-2018-20406" }, { "category": "external", "summary": "SUSE Bug 1120644 for CVE-2018-20406", "url": "https://bugzilla.suse.com/1120644" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2018-20406" }, { "cve": "CVE-2018-20852", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-20852" } ], "notes": [ { "category": "general", "text": "http.cookiejar.DefaultPolicy.domain_return_ok in Lib/http/cookiejar.py in Python before 3.7.3 does not correctly validate the domain: it can be tricked into sending existing cookies to the wrong server. An attacker may abuse this flaw by using a server with a hostname that has another valid hostname as a suffix (e.g., pythonicexample.com to steal cookies for example.com). When a program uses http.cookiejar.DefaultPolicy and tries to do an HTTP connection to an attacker-controlled server, existing cookies can be leaked to the attacker. This affects 2.x through 2.7.16, 3.x before 3.4.10, 3.5.x before 3.5.7, 3.6.x before 3.6.9, and 3.7.x before 3.7.3.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-20852", "url": "https://www.suse.com/security/cve/CVE-2018-20852" }, { "category": "external", "summary": "SUSE Bug 1141853 for CVE-2018-20852", "url": "https://bugzilla.suse.com/1141853" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2018-20852" }, { "cve": "CVE-2018-7158", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7158" } ], "notes": [ { "category": "general", "text": "The `\u0027path\u0027` module in the Node.js 4.x release line contains a potential regular expression denial of service (ReDoS) vector. The code in question was replaced in Node.js 6.x and later so this vulnerability only impacts all versions of Node.js 4.x. The regular expression, `splitPathRe`, used within the `\u0027path\u0027` module for the various path parsing functions, including `path.dirname()`, `path.extname()` and `path.parse()` was structured in such a way as to allow an attacker to craft a string, that when passed through one of these functions, could take a significant amount of time to evaluate, potentially leading to a full denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7158", "url": "https://www.suse.com/security/cve/CVE-2018-7158" }, { "category": "external", "summary": "SUSE Bug 1087459 for CVE-2018-7158", "url": "https://bugzilla.suse.com/1087459" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2018-7158" }, { "cve": "CVE-2018-7159", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7159" } ], "notes": [ { "category": "general", "text": "The HTTP parser in all current versions of Node.js ignores spaces in the `Content-Length` header, allowing input such as `Content-Length: 1 2` to be interpreted as having a value of `12`. The HTTP specification does not allow for spaces in the `Content-Length` value and the Node.js HTTP parser has been brought into line on this particular difference. The security risk of this flaw to Node.js users is considered to be VERY LOW as it is difficult, and may be impossible, to craft an attack that makes use of this flaw in a way that could not already be achieved by supplying an incorrect value for `Content-Length`. Vulnerabilities may exist in user-code that make incorrect assumptions about the potential accuracy of this value compared to the actual length of the data supplied. Node.js users crafting lower-level HTTP utilities are advised to re-check the length of any input supplied after parsing is complete.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7159", "url": "https://www.suse.com/security/cve/CVE-2018-7159" }, { "category": "external", "summary": "SUSE Bug 1087453 for CVE-2018-7159", "url": "https://bugzilla.suse.com/1087453" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "low" } ], "title": "CVE-2018-7159" }, { "cve": "CVE-2018-7160", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7160" } ], "notes": [ { "category": "general", "text": "The Node.js inspector, in 6.x and later is vulnerable to a DNS rebinding attack which could be exploited to perform remote code execution. An attack is possible from malicious websites open in a web browser on the same computer, or another computer with network access to the computer running the Node.js process. A malicious website could use a DNS rebinding attack to trick the web browser to bypass same-origin-policy checks and to allow HTTP connections to localhost or to hosts on the local network. If a Node.js process with the debug port active is running on localhost or on a host on the local network, the malicious website could connect to it as a debugger, and get full code execution access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7160", "url": "https://www.suse.com/security/cve/CVE-2018-7160" }, { "category": "external", "summary": "SUSE Bug 1087463 for CVE-2018-7160", "url": "https://bugzilla.suse.com/1087463" }, { "category": "external", "summary": "SUSE Bug 1182620 for CVE-2018-7160", "url": "https://bugzilla.suse.com/1182620" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2018-7160" }, { "cve": "CVE-2018-7161", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7161" } ], "notes": [ { "category": "general", "text": "All versions of Node.js 8.x, 9.x, and 10.x are vulnerable and the severity is HIGH. An attacker can cause a denial of service (DoS) by causing a node server providing an http2 server to crash. This can be accomplished by interacting with the http2 server in a manner that triggers a cleanup bug where objects are used in native code after they are no longer available. This has been addressed by updating the http2 implementation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7161", "url": "https://www.suse.com/security/cve/CVE-2018-7161" }, { "category": "external", "summary": "SUSE Bug 1097404 for CVE-2018-7161", "url": "https://bugzilla.suse.com/1097404" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2018-7161" }, { "cve": "CVE-2018-7167", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7167" } ], "notes": [ { "category": "general", "text": "Calling Buffer.fill() or Buffer.alloc() with some parameters can lead to a hang which could result in a Denial of Service. In order to address this vulnerability, the implementations of Buffer.alloc() and Buffer.fill() were updated so that they zero fill instead of hanging in these cases. All versions of Node.js 6.x (LTS \"Boron\"), 8.x (LTS \"Carbon\"), and 9.x are vulnerable. All versions of Node.js 10.x (Current) are NOT vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7167", "url": "https://www.suse.com/security/cve/CVE-2018-7167" }, { "category": "external", "summary": "SUSE Bug 1097375 for CVE-2018-7167", "url": "https://bugzilla.suse.com/1097375" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2018-7167" }, { "cve": "CVE-2019-10160", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-10160" } ], "notes": [ { "category": "general", "text": "A security regression of CVE-2019-9636 was discovered in python since commit d537ab0ff9767ef024f26246899728f0116b1ec3 affecting versions 2.7, 3.5, 3.6, 3.7 and from v3.8.0a4 through v3.8.0b1, which still allows an attacker to exploit CVE-2019-9636 by abusing the user and password parts of a URL. When an application parses user-supplied URLs to store cookies, authentication credentials, or other kind of information, it is possible for an attacker to provide specially crafted URLs to make the application locate host-related information (e.g. cookies, authentication data) and send them to a different host than where it should, unlike if the URLs had been correctly parsed. The result of an attack may vary based on the application.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-10160", "url": "https://www.suse.com/security/cve/CVE-2019-10160" }, { "category": "external", "summary": "SUSE Bug 1138459 for CVE-2019-10160", "url": "https://bugzilla.suse.com/1138459" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-10160" }, { "cve": "CVE-2019-11709", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11709" } ], "notes": [ { "category": "general", "text": "Mozilla developers and community members reported memory safety bugs present in Firefox 67 and Firefox ESR 60.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox ESR \u003c 60.8, Firefox \u003c 68, and Thunderbird \u003c 60.8.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11709", "url": "https://www.suse.com/security/cve/CVE-2019-11709" }, { "category": "external", "summary": "SUSE Bug 1140868 for CVE-2019-11709", "url": "https://bugzilla.suse.com/1140868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11709" }, { "cve": "CVE-2019-11710", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11710" } ], "notes": [ { "category": "general", "text": "Mozilla developers and community members reported memory safety bugs present in Firefox 67. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox \u003c 68.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11710", "url": "https://www.suse.com/security/cve/CVE-2019-11710" }, { "category": "external", "summary": "SUSE Bug 1140868 for CVE-2019-11710", "url": "https://bugzilla.suse.com/1140868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11710" }, { "cve": "CVE-2019-11711", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11711" } ], "notes": [ { "category": "general", "text": "When an inner window is reused, it does not consider the use of document.domain for cross-origin protections. If pages on different subdomains ever cooperatively use document.domain, then either page can abuse this to inject script into arbitrary pages on the other subdomain, even those that did not use document.domain to relax their origin security. This vulnerability affects Firefox ESR \u003c 60.8, Firefox \u003c 68, and Thunderbird \u003c 60.8.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11711", "url": "https://www.suse.com/security/cve/CVE-2019-11711" }, { "category": "external", "summary": "SUSE Bug 1140868 for CVE-2019-11711", "url": "https://bugzilla.suse.com/1140868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11711" }, { "cve": "CVE-2019-11712", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11712" } ], "notes": [ { "category": "general", "text": "POST requests made by NPAPI plugins, such as Flash, that receive a status 308 redirect response can bypass CORS requirements. This can allow an attacker to perform Cross-Site Request Forgery (CSRF) attacks. This vulnerability affects Firefox ESR \u003c 60.8, Firefox \u003c 68, and Thunderbird \u003c 60.8.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11712", "url": "https://www.suse.com/security/cve/CVE-2019-11712" }, { "category": "external", "summary": "SUSE Bug 1140868 for CVE-2019-11712", "url": "https://bugzilla.suse.com/1140868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11712" }, { "cve": "CVE-2019-11713", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11713" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability can occur in HTTP/2 when a cached HTTP/2 stream is closed while still in use, resulting in a potentially exploitable crash. This vulnerability affects Firefox ESR \u003c 60.8, Firefox \u003c 68, and Thunderbird \u003c 60.8.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11713", "url": "https://www.suse.com/security/cve/CVE-2019-11713" }, { "category": "external", "summary": "SUSE Bug 1140868 for CVE-2019-11713", "url": "https://bugzilla.suse.com/1140868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11713" }, { "cve": "CVE-2019-11714", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11714" } ], "notes": [ { "category": "general", "text": "Necko can access a child on the wrong thread during UDP connections, resulting in a potentially exploitable crash in some instances. This vulnerability affects Firefox \u003c 68.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11714", "url": "https://www.suse.com/security/cve/CVE-2019-11714" }, { "category": "external", "summary": "SUSE Bug 1140868 for CVE-2019-11714", "url": "https://bugzilla.suse.com/1140868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11714" }, { "cve": "CVE-2019-11715", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11715" } ], "notes": [ { "category": "general", "text": "Due to an error while parsing page content, it is possible for properly sanitized user input to be misinterpreted and lead to XSS hazards on web sites in certain circumstances. This vulnerability affects Firefox ESR \u003c 60.8, Firefox \u003c 68, and Thunderbird \u003c 60.8.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11715", "url": "https://www.suse.com/security/cve/CVE-2019-11715" }, { "category": "external", "summary": "SUSE Bug 1140868 for CVE-2019-11715", "url": "https://bugzilla.suse.com/1140868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11715" }, { "cve": "CVE-2019-11716", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11716" } ], "notes": [ { "category": "general", "text": "Until explicitly accessed by script, window.globalThis is not enumerable and, as a result, is not visible to code such as Object.getOwnPropertyNames(window). Sites that deploy a sandboxing that depends on enumerating and freezing access to the window object may miss this, allowing their sandboxes to be bypassed. This vulnerability affects Firefox \u003c 68.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11716", "url": "https://www.suse.com/security/cve/CVE-2019-11716" }, { "category": "external", "summary": "SUSE Bug 1140868 for CVE-2019-11716", "url": "https://bugzilla.suse.com/1140868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11716" }, { "cve": "CVE-2019-11717", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11717" } ], "notes": [ { "category": "general", "text": "A vulnerability exists where the caret (\"^\") character is improperly escaped constructing some URIs due to it being used as a separator, allowing for possible spoofing of origin attributes. This vulnerability affects Firefox ESR \u003c 60.8, Firefox \u003c 68, and Thunderbird \u003c 60.8.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11717", "url": "https://www.suse.com/security/cve/CVE-2019-11717" }, { "category": "external", "summary": "SUSE Bug 1140868 for CVE-2019-11717", "url": "https://bugzilla.suse.com/1140868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11717" }, { "cve": "CVE-2019-11718", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11718" } ], "notes": [ { "category": "general", "text": "Activity Stream can display content from sent from the Snippet Service website. This content is written to innerHTML on the Activity Stream page without sanitization, allowing for a potential access to other information available to the Activity Stream, such as browsing history, if the Snipper Service were compromised. This vulnerability affects Firefox \u003c 68.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11718", "url": "https://www.suse.com/security/cve/CVE-2019-11718" }, { "category": "external", "summary": "SUSE Bug 1140868 for CVE-2019-11718", "url": "https://bugzilla.suse.com/1140868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11718" }, { "cve": "CVE-2019-11719", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11719" } ], "notes": [ { "category": "general", "text": "When importing a curve25519 private key in PKCS#8format with leading 0x00 bytes, it is possible to trigger an out-of-bounds read in the Network Security Services (NSS) library. This could lead to information disclosure. This vulnerability affects Firefox ESR \u003c 60.8, Firefox \u003c 68, and Thunderbird \u003c 60.8.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11719", "url": "https://www.suse.com/security/cve/CVE-2019-11719" }, { "category": "external", "summary": "SUSE Bug 1140868 for CVE-2019-11719", "url": "https://bugzilla.suse.com/1140868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11719" }, { "cve": "CVE-2019-11720", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11720" } ], "notes": [ { "category": "general", "text": "Some unicode characters are incorrectly treated as whitespace during the parsing of web content instead of triggering parsing errors. This allows malicious code to then be processed, evading cross-site scripting (XSS) filtering. This vulnerability affects Firefox \u003c 68.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11720", "url": "https://www.suse.com/security/cve/CVE-2019-11720" }, { "category": "external", "summary": "SUSE Bug 1140868 for CVE-2019-11720", "url": "https://bugzilla.suse.com/1140868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11720" }, { "cve": "CVE-2019-11721", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11721" } ], "notes": [ { "category": "general", "text": "The unicode latin \u0027kra\u0027 character can be used to spoof a standard \u0027k\u0027 character in the addressbar. This allows for domain spoofing attacks as do not display as punycode text, allowing for user confusion. This vulnerability affects Firefox \u003c 68.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11721", "url": "https://www.suse.com/security/cve/CVE-2019-11721" }, { "category": "external", "summary": "SUSE Bug 1140868 for CVE-2019-11721", "url": "https://bugzilla.suse.com/1140868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11721" }, { "cve": "CVE-2019-11723", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11723" } ], "notes": [ { "category": "general", "text": "A vulnerability exists during the installation of add-ons where the initial fetch ignored the origin attributes of the browsing context. This could leak cookies in private browsing mode or across different \"containers\" for people who use the Firefox Multi-Account Containers Web Extension. This vulnerability affects Firefox \u003c 68.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11723", "url": "https://www.suse.com/security/cve/CVE-2019-11723" }, { "category": "external", "summary": "SUSE Bug 1140868 for CVE-2019-11723", "url": "https://bugzilla.suse.com/1140868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11723" }, { "cve": "CVE-2019-11724", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11724" } ], "notes": [ { "category": "general", "text": "Application permissions give additional remote troubleshooting permission to the site input.mozilla.org, which has been retired and now redirects to another site. This additional permission is unnecessary and is a potential vector for malicious attacks. This vulnerability affects Firefox \u003c 68.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11724", "url": "https://www.suse.com/security/cve/CVE-2019-11724" }, { "category": "external", "summary": "SUSE Bug 1140868 for CVE-2019-11724", "url": "https://bugzilla.suse.com/1140868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11724" }, { "cve": "CVE-2019-11725", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11725" } ], "notes": [ { "category": "general", "text": "When a user navigates to site marked as unsafe by the Safebrowsing API, warning messages are displayed and navigation is interrupted but resources from the same site loaded through websockets are not blocked, leading to the loading of unsafe resources and bypassing safebrowsing protections. This vulnerability affects Firefox \u003c 68.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11725", "url": "https://www.suse.com/security/cve/CVE-2019-11725" }, { "category": "external", "summary": "SUSE Bug 1140868 for CVE-2019-11725", "url": "https://bugzilla.suse.com/1140868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11725" }, { "cve": "CVE-2019-11727", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11727" } ], "notes": [ { "category": "general", "text": "A vulnerability exists where it possible to force Network Security Services (NSS) to sign CertificateVerify with PKCS#1 v1.5 signatures when those are the only ones advertised by server in CertificateRequest in TLS 1.3. PKCS#1 v1.5 signatures should not be used for TLS 1.3 messages. This vulnerability affects Firefox \u003c 68.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11727", "url": "https://www.suse.com/security/cve/CVE-2019-11727" }, { "category": "external", "summary": "SUSE Bug 1140868 for CVE-2019-11727", "url": "https://bugzilla.suse.com/1140868" }, { "category": "external", "summary": "SUSE Bug 1141322 for CVE-2019-11727", "url": "https://bugzilla.suse.com/1141322" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2019-11727" }, { "cve": "CVE-2019-11728", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11728" } ], "notes": [ { "category": "general", "text": "The HTTP Alternative Services header, Alt-Svc, can be used by a malicious site to scan all TCP ports of any host that the accessible to a user when web content is loaded. This vulnerability affects Firefox \u003c 68.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11728", "url": "https://www.suse.com/security/cve/CVE-2019-11728" }, { "category": "external", "summary": "SUSE Bug 1140868 for CVE-2019-11728", "url": "https://bugzilla.suse.com/1140868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11728" }, { "cve": "CVE-2019-11729", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11729" } ], "notes": [ { "category": "general", "text": "Empty or malformed p256-ECDH public keys may trigger a segmentation fault due values being improperly sanitized before being copied into memory and used. This vulnerability affects Firefox ESR \u003c 60.8, Firefox \u003c 68, and Thunderbird \u003c 60.8.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11729", "url": "https://www.suse.com/security/cve/CVE-2019-11729" }, { "category": "external", "summary": "SUSE Bug 1140868 for CVE-2019-11729", "url": "https://bugzilla.suse.com/1140868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11729" }, { "cve": "CVE-2019-11730", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11730" } ], "notes": [ { "category": "general", "text": "A vulnerability exists where if a user opens a locally saved HTML file, this file can use file: URIs to access other files in the same directory or sub-directories if the names are known or guessed. The Fetch API can then be used to read the contents of any files stored in these directories and they may uploaded to a server. It was demonstrated that in combination with a popular Android messaging app, if a malicious HTML attachment is sent to a user and they opened that attachment in Firefox, due to that app\u0027s predictable pattern for locally-saved file names, it is possible to read attachments the victim received from other correspondents. This vulnerability affects Firefox ESR \u003c 60.8, Firefox \u003c 68, and Thunderbird \u003c 60.8.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11730", "url": "https://www.suse.com/security/cve/CVE-2019-11730" }, { "category": "external", "summary": "SUSE Bug 1140868 for CVE-2019-11730", "url": "https://bugzilla.suse.com/1140868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11730" }, { "cve": "CVE-2019-11733", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11733" } ], "notes": [ { "category": "general", "text": "When a master password is set, it is required to be entered again before stored passwords can be accessed in the \u0027Saved Logins\u0027 dialog. It was found that locally stored passwords can be copied to the clipboard thorough the \u0027copy password\u0027 context menu item without re-entering the master password if the master password had been previously entered in the same session, allowing for potential theft of stored passwords. This vulnerability affects Firefox \u003c 68.0.2 and Firefox ESR \u003c 68.0.2.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11733", "url": "https://www.suse.com/security/cve/CVE-2019-11733" }, { "category": "external", "summary": "SUSE Bug 1145665 for CVE-2019-11733", "url": "https://bugzilla.suse.com/1145665" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2019-11733" }, { "cve": "CVE-2019-11735", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11735" } ], "notes": [ { "category": "general", "text": "Mozilla developers and community members reported memory safety bugs present in Firefox 68 and Firefox ESR 68. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox \u003c 69 and Firefox ESR \u003c 68.1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11735", "url": "https://www.suse.com/security/cve/CVE-2019-11735" }, { "category": "external", "summary": "SUSE Bug 1149293 for CVE-2019-11735", "url": "https://bugzilla.suse.com/1149293" }, { "category": "external", "summary": "SUSE Bug 1149323 for CVE-2019-11735", "url": "https://bugzilla.suse.com/1149323" }, { "category": "external", "summary": "SUSE Bug 1149324 for CVE-2019-11735", "url": "https://bugzilla.suse.com/1149324" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11735" }, { "cve": "CVE-2019-11736", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11736" } ], "notes": [ { "category": "general", "text": "The Mozilla Maintenance Service does not guard against files being hardlinked to another file in the updates directory, allowing for the replacement of local files, including the Maintenance Service executable, which is run with privileged access. Additionally, there was a race condition during checks for junctions and symbolic links by the Maintenance Service, allowing for potential local file and directory manipulation to be undetected in some circumstances. This allows for potential privilege escalation by a user with unprivileged local access. \u003cbr\u003e*Note: These attacks requires local system access and only affects Windows. Other operating systems are not affected.*. This vulnerability affects Firefox \u003c 69 and Firefox ESR \u003c 68.1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11736", "url": "https://www.suse.com/security/cve/CVE-2019-11736" }, { "category": "external", "summary": "SUSE Bug 1149292 for CVE-2019-11736", "url": "https://bugzilla.suse.com/1149292" }, { "category": "external", "summary": "SUSE Bug 1149323 for CVE-2019-11736", "url": "https://bugzilla.suse.com/1149323" }, { "category": "external", "summary": "SUSE Bug 1149324 for CVE-2019-11736", "url": "https://bugzilla.suse.com/1149324" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11736" }, { "cve": "CVE-2019-11738", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11738" } ], "notes": [ { "category": "general", "text": "If a Content Security Policy (CSP) directive is defined that uses a hash-based source that takes the empty string as input, execution of any javascript: URIs will be allowed. This could allow for malicious JavaScript content to be run, bypassing CSP permissions. This vulnerability affects Firefox \u003c 69 and Firefox ESR \u003c 68.1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11738", "url": "https://www.suse.com/security/cve/CVE-2019-11738" }, { "category": "external", "summary": "SUSE Bug 1149302 for CVE-2019-11738", "url": "https://bugzilla.suse.com/1149302" }, { "category": "external", "summary": "SUSE Bug 1149323 for CVE-2019-11738", "url": "https://bugzilla.suse.com/1149323" }, { "category": "external", "summary": "SUSE Bug 1149324 for CVE-2019-11738", "url": "https://bugzilla.suse.com/1149324" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2019-11738" }, { "cve": "CVE-2019-11740", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11740" } ], "notes": [ { "category": "general", "text": "Mozilla developers and community members reported memory safety bugs present in Firefox 68, Firefox ESR 68, and Firefox 60.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox \u003c 69, Thunderbird \u003c 68.1, Thunderbird \u003c 60.9, Firefox ESR \u003c 60.9, and Firefox ESR \u003c 68.1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11740", "url": "https://www.suse.com/security/cve/CVE-2019-11740" }, { "category": "external", "summary": "SUSE Bug 1149299 for CVE-2019-11740", "url": "https://bugzilla.suse.com/1149299" }, { "category": "external", "summary": "SUSE Bug 1149323 for CVE-2019-11740", "url": "https://bugzilla.suse.com/1149323" }, { "category": "external", "summary": "SUSE Bug 1149324 for CVE-2019-11740", "url": "https://bugzilla.suse.com/1149324" }, { "category": "external", "summary": "SUSE Bug 1150940 for CVE-2019-11740", "url": "https://bugzilla.suse.com/1150940" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11740" }, { "cve": "CVE-2019-11742", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11742" } ], "notes": [ { "category": "general", "text": "A same-origin policy violation occurs allowing the theft of cross-origin images through a combination of SVG filters and a \u0026lt;canvas\u0026gt; element due to an error in how same-origin policy is applied to cached image content. The resulting same-origin policy violation could allow for data theft. This vulnerability affects Firefox \u003c 69, Thunderbird \u003c 68.1, Thunderbird \u003c 60.9, Firefox ESR \u003c 60.9, and Firefox ESR \u003c 68.1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11742", "url": "https://www.suse.com/security/cve/CVE-2019-11742" }, { "category": "external", "summary": "SUSE Bug 1149303 for CVE-2019-11742", "url": "https://bugzilla.suse.com/1149303" }, { "category": "external", "summary": "SUSE Bug 1149323 for CVE-2019-11742", "url": "https://bugzilla.suse.com/1149323" }, { "category": "external", "summary": "SUSE Bug 1149324 for CVE-2019-11742", "url": "https://bugzilla.suse.com/1149324" }, { "category": "external", "summary": "SUSE Bug 1150940 for CVE-2019-11742", "url": "https://bugzilla.suse.com/1150940" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11742" }, { "cve": "CVE-2019-11743", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11743" } ], "notes": [ { "category": "general", "text": "Navigation events were not fully adhering to the W3C\u0027s \"Navigation-Timing Level 2\" draft specification in some instances for the unload event, which restricts access to detailed timing attributes to only be same-origin. This resulted in potential cross-origin information exposure of history through timing side-channel attacks. This vulnerability affects Firefox \u003c 69, Thunderbird \u003c 68.1, Thunderbird \u003c 60.9, Firefox ESR \u003c 60.9, and Firefox ESR \u003c 68.1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11743", "url": "https://www.suse.com/security/cve/CVE-2019-11743" }, { "category": "external", "summary": "SUSE Bug 1149298 for CVE-2019-11743", "url": "https://bugzilla.suse.com/1149298" }, { "category": "external", "summary": "SUSE Bug 1149323 for CVE-2019-11743", "url": "https://bugzilla.suse.com/1149323" }, { "category": "external", "summary": "SUSE Bug 1149324 for CVE-2019-11743", "url": "https://bugzilla.suse.com/1149324" }, { "category": "external", "summary": "SUSE Bug 1150940 for CVE-2019-11743", "url": "https://bugzilla.suse.com/1150940" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2019-11743" }, { "cve": "CVE-2019-11744", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11744" } ], "notes": [ { "category": "general", "text": "Some HTML elements, such as \u0026lt;title\u0026gt; and \u0026lt;textarea\u0026gt;, can contain literal angle brackets without treating them as markup. It is possible to pass a literal closing tag to .innerHTML on these elements, and subsequent content after that will be parsed as if it were outside the tag. This can lead to XSS if a site does not filter user input as strictly for these elements as it does for other elements. This vulnerability affects Firefox \u003c 69, Thunderbird \u003c 68.1, Thunderbird \u003c 60.9, Firefox ESR \u003c 60.9, and Firefox ESR \u003c 68.1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11744", "url": "https://www.suse.com/security/cve/CVE-2019-11744" }, { "category": "external", "summary": "SUSE Bug 1149304 for CVE-2019-11744", "url": "https://bugzilla.suse.com/1149304" }, { "category": "external", "summary": "SUSE Bug 1149323 for CVE-2019-11744", "url": "https://bugzilla.suse.com/1149323" }, { "category": "external", "summary": "SUSE Bug 1149324 for CVE-2019-11744", "url": "https://bugzilla.suse.com/1149324" }, { "category": "external", "summary": "SUSE Bug 1150940 for CVE-2019-11744", "url": "https://bugzilla.suse.com/1150940" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11744" }, { "cve": "CVE-2019-11746", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11746" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability can occur while manipulating video elements if the body is freed while still in use. This results in a potentially exploitable crash. This vulnerability affects Firefox \u003c 69, Thunderbird \u003c 68.1, Thunderbird \u003c 60.9, Firefox ESR \u003c 60.9, and Firefox ESR \u003c 68.1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11746", "url": "https://www.suse.com/security/cve/CVE-2019-11746" }, { "category": "external", "summary": "SUSE Bug 1149297 for CVE-2019-11746", "url": "https://bugzilla.suse.com/1149297" }, { "category": "external", "summary": "SUSE Bug 1149323 for CVE-2019-11746", "url": "https://bugzilla.suse.com/1149323" }, { "category": "external", "summary": "SUSE Bug 1149324 for CVE-2019-11746", "url": "https://bugzilla.suse.com/1149324" }, { "category": "external", "summary": "SUSE Bug 1150940 for CVE-2019-11746", "url": "https://bugzilla.suse.com/1150940" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11746" }, { "cve": "CVE-2019-11747", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11747" } ], "notes": [ { "category": "general", "text": "The \"Forget about this site\" feature in the History pane is intended to remove all saved user data that indicates a user has visited a site. This includes removing any HTTP Strict Transport Security (HSTS) settings received from sites that use it. Due to a bug, sites on the pre-load list also have their HSTS setting removed. On the next visit to that site if the user specifies an http: URL rather than secure https: they will not be protected by the pre-loaded HSTS setting. After that visit the site\u0027s HSTS setting will be restored. This vulnerability affects Firefox \u003c 69 and Firefox ESR \u003c 68.1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11747", "url": "https://www.suse.com/security/cve/CVE-2019-11747" }, { "category": "external", "summary": "SUSE Bug 1149301 for CVE-2019-11747", "url": "https://bugzilla.suse.com/1149301" }, { "category": "external", "summary": "SUSE Bug 1149323 for CVE-2019-11747", "url": "https://bugzilla.suse.com/1149323" }, { "category": "external", "summary": "SUSE Bug 1149324 for CVE-2019-11747", "url": "https://bugzilla.suse.com/1149324" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.4, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "low" } ], "title": "CVE-2019-11747" }, { "cve": "CVE-2019-11748", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11748" } ], "notes": [ { "category": "general", "text": "WebRTC in Firefox will honor persisted permissions given to sites for access to microphone and camera resources even when in a third-party context. In light of recent high profile vulnerabilities in other software, a decision was made to no longer persist these permissions. This avoids the possibility of trusted WebRTC resources being invisibly embedded in web content and abusing permissions previously given by users. Users will now be prompted for permissions on each use. This vulnerability affects Firefox \u003c 69 and Firefox ESR \u003c 68.1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11748", "url": "https://www.suse.com/security/cve/CVE-2019-11748" }, { "category": "external", "summary": "SUSE Bug 1149291 for CVE-2019-11748", "url": "https://bugzilla.suse.com/1149291" }, { "category": "external", "summary": "SUSE Bug 1149323 for CVE-2019-11748", "url": "https://bugzilla.suse.com/1149323" }, { "category": "external", "summary": "SUSE Bug 1149324 for CVE-2019-11748", "url": "https://bugzilla.suse.com/1149324" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2019-11748" }, { "cve": "CVE-2019-11749", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11749" } ], "notes": [ { "category": "general", "text": "A vulnerability exists in WebRTC where malicious web content can use probing techniques on the getUserMedia API using constraints to reveal device properties of cameras on the system without triggering a user prompt or notification. This allows for the potential fingerprinting of users. This vulnerability affects Firefox \u003c 69 and Firefox ESR \u003c 68.1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11749", "url": "https://www.suse.com/security/cve/CVE-2019-11749" }, { "category": "external", "summary": "SUSE Bug 1149290 for CVE-2019-11749", "url": "https://bugzilla.suse.com/1149290" }, { "category": "external", "summary": "SUSE Bug 1149323 for CVE-2019-11749", "url": "https://bugzilla.suse.com/1149323" }, { "category": "external", "summary": "SUSE Bug 1149324 for CVE-2019-11749", "url": "https://bugzilla.suse.com/1149324" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2019-11749" }, { "cve": "CVE-2019-11750", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11750" } ], "notes": [ { "category": "general", "text": "A type confusion vulnerability exists in Spidermonkey, which results in a non-exploitable crash. This vulnerability affects Firefox \u003c 69 and Firefox ESR \u003c 68.1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11750", "url": "https://www.suse.com/security/cve/CVE-2019-11750" }, { "category": "external", "summary": "SUSE Bug 1149289 for CVE-2019-11750", "url": "https://bugzilla.suse.com/1149289" }, { "category": "external", "summary": "SUSE Bug 1149323 for CVE-2019-11750", "url": "https://bugzilla.suse.com/1149323" }, { "category": "external", "summary": "SUSE Bug 1149324 for CVE-2019-11750", "url": "https://bugzilla.suse.com/1149324" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2019-11750" }, { "cve": "CVE-2019-11751", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11751" } ], "notes": [ { "category": "general", "text": "Logging-related command line parameters are not properly sanitized when Firefox is launched by another program, such as when a user clicks on malicious links in a chat application. This can be used to write a log file to an arbitrary location such as the Windows \u0027Startup\u0027 folder. \u003cbr\u003e*Note: this issue only affects Firefox on Windows operating systems.*. This vulnerability affects Firefox \u003c 69 and Firefox ESR \u003c 68.1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11751", "url": "https://www.suse.com/security/cve/CVE-2019-11751" }, { "category": "external", "summary": "SUSE Bug 1149286 for CVE-2019-11751", "url": "https://bugzilla.suse.com/1149286" }, { "category": "external", "summary": "SUSE Bug 1149323 for CVE-2019-11751", "url": "https://bugzilla.suse.com/1149323" }, { "category": "external", "summary": "SUSE Bug 1149324 for CVE-2019-11751", "url": "https://bugzilla.suse.com/1149324" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11751" }, { "cve": "CVE-2019-11752", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11752" } ], "notes": [ { "category": "general", "text": "It is possible to delete an IndexedDB key value and subsequently try to extract it during conversion. This results in a use-after-free and a potentially exploitable crash. This vulnerability affects Firefox \u003c 69, Thunderbird \u003c 68.1, Thunderbird \u003c 60.9, Firefox ESR \u003c 60.9, and Firefox ESR \u003c 68.1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11752", "url": "https://www.suse.com/security/cve/CVE-2019-11752" }, { "category": "external", "summary": "SUSE Bug 1149296 for CVE-2019-11752", "url": "https://bugzilla.suse.com/1149296" }, { "category": "external", "summary": "SUSE Bug 1149323 for CVE-2019-11752", "url": "https://bugzilla.suse.com/1149323" }, { "category": "external", "summary": "SUSE Bug 1149324 for CVE-2019-11752", "url": "https://bugzilla.suse.com/1149324" }, { "category": "external", "summary": "SUSE Bug 1150940 for CVE-2019-11752", "url": "https://bugzilla.suse.com/1150940" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11752" }, { "cve": "CVE-2019-11753", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11753" } ], "notes": [ { "category": "general", "text": "The Firefox installer allows Firefox to be installed to a custom user writable location, leaving it unprotected from manipulation by unprivileged users or malware. If the Mozilla Maintenance Service is manipulated to update this unprotected location and the updated maintenance service in the unprotected location has been altered, the altered maintenance service can run with elevated privileges during the update process due to a lack of integrity checks. This allows for privilege escalation if the executable has been replaced locally. \u003cbr\u003e*Note: This attack requires local system access and only affects Windows. Other operating systems are not affected.*. This vulnerability affects Firefox \u003c 69, Firefox ESR \u003c 60.9, and Firefox ESR \u003c 68.1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11753", "url": "https://www.suse.com/security/cve/CVE-2019-11753" }, { "category": "external", "summary": "SUSE Bug 1149295 for CVE-2019-11753", "url": "https://bugzilla.suse.com/1149295" }, { "category": "external", "summary": "SUSE Bug 1149323 for CVE-2019-11753", "url": "https://bugzilla.suse.com/1149323" }, { "category": "external", "summary": "SUSE Bug 1149324 for CVE-2019-11753", "url": "https://bugzilla.suse.com/1149324" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11753" }, { "cve": "CVE-2019-11757", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11757" } ], "notes": [ { "category": "general", "text": "When following the value\u0027s prototype chain, it was possible to retain a reference to a locale, delete it, and subsequently reference it. This resulted in a use-after-free and a potentially exploitable crash. This vulnerability affects Firefox \u003c 70, Thunderbird \u003c 68.2, and Firefox ESR \u003c 68.2.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11757", "url": "https://www.suse.com/security/cve/CVE-2019-11757" }, { "category": "external", "summary": "SUSE Bug 1154738 for CVE-2019-11757", "url": "https://bugzilla.suse.com/1154738" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11757" }, { "cve": "CVE-2019-11758", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11758" } ], "notes": [ { "category": "general", "text": "Mozilla community member Philipp reported a memory safety bug present in Firefox 68 when 360 Total Security was installed. This bug showed evidence of memory corruption in the accessibility engine and we presume that with enough effort that it could be exploited to run arbitrary code. This vulnerability affects Firefox \u003c 69, Thunderbird \u003c 68.2, and Firefox ESR \u003c 68.2.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11758", "url": "https://www.suse.com/security/cve/CVE-2019-11758" }, { "category": "external", "summary": "SUSE Bug 1154738 for CVE-2019-11758", "url": "https://bugzilla.suse.com/1154738" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11758" }, { "cve": "CVE-2019-11759", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11759" } ], "notes": [ { "category": "general", "text": "An attacker could have caused 4 bytes of HMAC output to be written past the end of a buffer stored on the stack. This could be used by an attacker to execute arbitrary code or more likely lead to a crash. This vulnerability affects Firefox \u003c 70, Thunderbird \u003c 68.2, and Firefox ESR \u003c 68.2.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11759", "url": "https://www.suse.com/security/cve/CVE-2019-11759" }, { "category": "external", "summary": "SUSE Bug 1154738 for CVE-2019-11759", "url": "https://bugzilla.suse.com/1154738" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11759" }, { "cve": "CVE-2019-11760", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11760" } ], "notes": [ { "category": "general", "text": "A fixed-size stack buffer could overflow in nrappkit when doing WebRTC signaling. This resulted in a potentially exploitable crash in some instances. This vulnerability affects Firefox \u003c 70, Thunderbird \u003c 68.2, and Firefox ESR \u003c 68.2.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11760", "url": "https://www.suse.com/security/cve/CVE-2019-11760" }, { "category": "external", "summary": "SUSE Bug 1154738 for CVE-2019-11760", "url": "https://bugzilla.suse.com/1154738" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11760" }, { "cve": "CVE-2019-11761", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11761" } ], "notes": [ { "category": "general", "text": "By using a form with a data URI it was possible to gain access to the privileged JSONView object that had been cloned into content. Impact from exposing this object appears to be minimal, however it was a bypass of existing defense in depth mechanisms. This vulnerability affects Firefox \u003c 70, Thunderbird \u003c 68.2, and Firefox ESR \u003c 68.2.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11761", "url": "https://www.suse.com/security/cve/CVE-2019-11761" }, { "category": "external", "summary": "SUSE Bug 1154738 for CVE-2019-11761", "url": "https://bugzilla.suse.com/1154738" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11761" }, { "cve": "CVE-2019-11762", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11762" } ], "notes": [ { "category": "general", "text": "If two same-origin documents set document.domain differently to become cross-origin, it was possible for them to call arbitrary DOM methods/getters/setters on the now-cross-origin window. This vulnerability affects Firefox \u003c 70, Thunderbird \u003c 68.2, and Firefox ESR \u003c 68.2.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11762", "url": "https://www.suse.com/security/cve/CVE-2019-11762" }, { "category": "external", "summary": "SUSE Bug 1154738 for CVE-2019-11762", "url": "https://bugzilla.suse.com/1154738" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11762" }, { "cve": "CVE-2019-11763", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11763" } ], "notes": [ { "category": "general", "text": "Failure to correctly handle null bytes when processing HTML entities resulted in Firefox incorrectly parsing these entities. This could have led to HTML comment text being treated as HTML which could have led to XSS in a web application under certain conditions. It could have also led to HTML entities being masked from filters - enabling the use of entities to mask the actual characters of interest from filters. This vulnerability affects Firefox \u003c 70, Thunderbird \u003c 68.2, and Firefox ESR \u003c 68.2.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11763", "url": "https://www.suse.com/security/cve/CVE-2019-11763" }, { "category": "external", "summary": "SUSE Bug 1154738 for CVE-2019-11763", "url": "https://bugzilla.suse.com/1154738" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11763" }, { "cve": "CVE-2019-11764", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11764" } ], "notes": [ { "category": "general", "text": "Mozilla developers and community members reported memory safety bugs present in Firefox 69 and Firefox ESR 68.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could be exploited to run arbitrary code. This vulnerability affects Firefox \u003c 70, Thunderbird \u003c 68.2, and Firefox ESR \u003c 68.2.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11764", "url": "https://www.suse.com/security/cve/CVE-2019-11764" }, { "category": "external", "summary": "SUSE Bug 1154738 for CVE-2019-11764", "url": "https://bugzilla.suse.com/1154738" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11764" }, { "cve": "CVE-2019-13173", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-13173" } ], "notes": [ { "category": "general", "text": "fstream before 1.0.12 is vulnerable to Arbitrary File Overwrite. Extracting tarballs containing a hardlink to a file that already exists in the system, and a file that matches the hardlink, will overwrite the system\u0027s file with the contents of the extracted file. The fstream.DirWriter() function is vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-13173", "url": "https://www.suse.com/security/cve/CVE-2019-13173" }, { "category": "external", "summary": "SUSE Bug 1140290 for CVE-2019-13173", "url": "https://bugzilla.suse.com/1140290" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2019-13173" }, { "cve": "CVE-2019-15903", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15903" } ], "notes": [ { "category": "general", "text": "In libexpat before 2.2.8, crafted XML input could fool the parser into changing from DTD parsing to document parsing too early; a consecutive call to XML_GetCurrentLineNumber (or XML_GetCurrentColumnNumber) then resulted in a heap-based buffer over-read.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15903", "url": "https://www.suse.com/security/cve/CVE-2019-15903" }, { "category": "external", "summary": "SUSE Bug 1149429 for CVE-2019-15903", "url": "https://bugzilla.suse.com/1149429" }, { "category": "external", "summary": "SUSE Bug 1154738 for CVE-2019-15903", "url": "https://bugzilla.suse.com/1154738" }, { "category": "external", "summary": "SUSE Bug 1154806 for CVE-2019-15903", "url": "https://bugzilla.suse.com/1154806" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-15903" }, { "cve": "CVE-2019-5010", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-5010" } ], "notes": [ { "category": "general", "text": "An exploitable denial-of-service vulnerability exists in the X509 certificate parser of Python.org Python 2.7.11 / 3.6.6. A specially crafted X509 certificate can cause a NULL pointer dereference, resulting in a denial of service. An attacker can initiate or accept TLS connections using crafted certificates to trigger this vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-5010", "url": "https://www.suse.com/security/cve/CVE-2019-5010" }, { "category": "external", "summary": "SUSE Bug 1122191 for CVE-2019-5010", "url": "https://bugzilla.suse.com/1122191" }, { "category": "external", "summary": "SUSE Bug 1126909 for CVE-2019-5010", "url": "https://bugzilla.suse.com/1126909" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2019-5010" }, { "cve": "CVE-2019-5737", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-5737" } ], "notes": [ { "category": "general", "text": "In Node.js including 6.x before 6.17.0, 8.x before 8.15.1, 10.x before 10.15.2, and 11.x before 11.10.1, an attacker can cause a Denial of Service (DoS) by establishing an HTTP or HTTPS connection in keep-alive mode and by sending headers very slowly. This keeps the connection and associated resources alive for a long period of time. Potential attacks are mitigated by the use of a load balancer or other proxy layer. This vulnerability is an extension of CVE-2018-12121, addressed in November and impacts all active Node.js release lines including 6.x before 6.17.0, 8.x before 8.15.1, 10.x before 10.15.2, and 11.x before 11.10.1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-5737", "url": "https://www.suse.com/security/cve/CVE-2019-5737" }, { "category": "external", "summary": "SUSE Bug 1127532 for CVE-2019-5737", "url": "https://bugzilla.suse.com/1127532" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-5737" }, { "cve": "CVE-2019-9511", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9511" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9511", "url": "https://www.suse.com/security/cve/CVE-2019-9511" }, { "category": "external", "summary": "SUSE Bug 1145579 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1145579" }, { "category": "external", "summary": "SUSE Bug 1146091 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1146091" }, { "category": "external", "summary": "SUSE Bug 1146182 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1146182" }, { "category": "external", "summary": "SUSE Bug 1193427 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1193427" }, { "category": "external", "summary": "SUSE Bug 1202787 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1202787" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "low" } ], "title": "CVE-2019-9511" }, { "cve": "CVE-2019-9512", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9512" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9512", "url": "https://www.suse.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146099 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1146099" }, { "category": "external", "summary": "SUSE Bug 1146111 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1146111" }, { "category": "external", "summary": "SUSE Bug 1147142 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1147142" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-9512" }, { "cve": "CVE-2019-9513", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9513" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9513", "url": "https://www.suse.com/security/cve/CVE-2019-9513" }, { "category": "external", "summary": "SUSE Bug 1145580 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1145580" }, { "category": "external", "summary": "SUSE Bug 1146094 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1146094" }, { "category": "external", "summary": "SUSE Bug 1146184 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1146184" }, { "category": "external", "summary": "SUSE Bug 1193427 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1193427" }, { "category": "external", "summary": "SUSE Bug 1202787 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1202787" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "low" } ], "title": "CVE-2019-9513" }, { "cve": "CVE-2019-9514", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9514" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9514", "url": "https://www.suse.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "SUSE Bug 1145662 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1145662" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146095 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1146095" }, { "category": "external", "summary": "SUSE Bug 1146115 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1146115" }, { "category": "external", "summary": "SUSE Bug 1147142 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1147142" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-9514" }, { "cve": "CVE-2019-9515", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9515" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to a settings flood, potentially leading to a denial of service. The attacker sends a stream of SETTINGS frames to the peer. Since the RFC requires that the peer reply with one acknowledgement per SETTINGS frame, an empty SETTINGS frame is almost equivalent in behavior to a ping. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9515", "url": "https://www.suse.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9515", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146100 for CVE-2019-9515", "url": "https://bugzilla.suse.com/1146100" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-9515" }, { "cve": "CVE-2019-9516", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9516" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service. The attacker sends a stream of headers with a 0-length header name and 0-length header value, optionally Huffman encoded into 1-byte or greater headers. Some implementations allocate memory for these headers and keep the allocation alive until the session dies. This can consume excess memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9516", "url": "https://www.suse.com/security/cve/CVE-2019-9516" }, { "category": "external", "summary": "SUSE Bug 1145582 for CVE-2019-9516", "url": "https://bugzilla.suse.com/1145582" }, { "category": "external", "summary": "SUSE Bug 1146090 for CVE-2019-9516", "url": "https://bugzilla.suse.com/1146090" }, { "category": "external", "summary": "SUSE Bug 1193427 for CVE-2019-9516", "url": "https://bugzilla.suse.com/1193427" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "low" } ], "title": "CVE-2019-9516" }, { "cve": "CVE-2019-9517", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9517" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to unconstrained interal data buffering, potentially leading to a denial of service. The attacker opens the HTTP/2 window so the peer can send without constraint; however, they leave the TCP window closed so the peer cannot actually write (many of) the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the servers queue the responses, this can consume excess memory, CPU, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9517", "url": "https://www.suse.com/security/cve/CVE-2019-9517" }, { "category": "external", "summary": "SUSE Bug 1145575 for CVE-2019-9517", "url": "https://bugzilla.suse.com/1145575" }, { "category": "external", "summary": "SUSE Bug 1146097 for CVE-2019-9517", "url": "https://bugzilla.suse.com/1146097" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2019-9517" }, { "cve": "CVE-2019-9518", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9518" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leading to a denial of service. The attacker sends a stream of frames with an empty payload and without the end-of-stream flag. These frames can be DATA, HEADERS, CONTINUATION and/or PUSH_PROMISE. The peer spends time processing each frame disproportionate to attack bandwidth. This can consume excess CPU.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9518", "url": "https://www.suse.com/security/cve/CVE-2019-9518" }, { "category": "external", "summary": "SUSE Bug 1145662 for CVE-2019-9518", "url": "https://bugzilla.suse.com/1145662" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9518", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146093 for CVE-2019-9518", "url": "https://bugzilla.suse.com/1146093" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-9518" }, { "cve": "CVE-2019-9636", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9636" } ], "notes": [ { "category": "general", "text": "Python 2.7.x through 2.7.16 and 3.x through 3.7.2 is affected by: Improper Handling of Unicode Encoding (with an incorrect netloc) during NFKC normalization. The impact is: Information disclosure (credentials, cookies, etc. that are cached against a given hostname). The components are: urllib.parse.urlsplit, urllib.parse.urlparse. The attack vector is: A specially crafted URL could be incorrectly parsed to locate cookies or authentication data and send that information to a different host than when parsed correctly. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.7, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.3, v3.7.3rc1, v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9636", "url": "https://www.suse.com/security/cve/CVE-2019-9636" }, { "category": "external", "summary": "SUSE Bug 1129346 for CVE-2019-9636", "url": "https://bugzilla.suse.com/1129346" }, { "category": "external", "summary": "SUSE Bug 1135433 for CVE-2019-9636", "url": "https://bugzilla.suse.com/1135433" }, { "category": "external", "summary": "SUSE Bug 1138459 for CVE-2019-9636", "url": "https://bugzilla.suse.com/1138459" }, { "category": "external", "summary": "SUSE Bug 1145004 for CVE-2019-9636", "url": "https://bugzilla.suse.com/1145004" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2019-9636" }, { "cve": "CVE-2019-9811", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9811" } ], "notes": [ { "category": "general", "text": "As part of a winning Pwn2Own entry, a researcher demonstrated a sandbox escape by installing a malicious language pack and then opening a browser feature that used the compromised translation. This vulnerability affects Firefox ESR \u003c 60.8, Firefox \u003c 68, and Thunderbird \u003c 60.8.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9811", "url": "https://www.suse.com/security/cve/CVE-2019-9811" }, { "category": "external", "summary": "SUSE Bug 1140868 for CVE-2019-9811", "url": "https://bugzilla.suse.com/1140868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-9811" }, { "cve": "CVE-2019-9812", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9812" } ], "notes": [ { "category": "general", "text": "Given a compromised sandboxed content process due to a separate vulnerability, it is possible to escape that sandbox by loading accounts.firefox.com in that process and forcing a log-in to a malicious Firefox Sync account. Preference settings that disable the sandbox are then synchronized to the local machine and the compromised browser would restart without the sandbox if a crash is triggered. This vulnerability affects Firefox ESR \u003c 60.9, Firefox ESR \u003c 68.1, and Firefox \u003c 69.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9812", "url": "https://www.suse.com/security/cve/CVE-2019-9812" }, { "category": "external", "summary": "SUSE Bug 1149294 for CVE-2019-9812", "url": "https://bugzilla.suse.com/1149294" }, { "category": "external", "summary": "SUSE Bug 1149323 for CVE-2019-9812", "url": "https://bugzilla.suse.com/1149323" }, { "category": "external", "summary": "SUSE Bug 1149324 for CVE-2019-9812", "url": "https://bugzilla.suse.com/1149324" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-9812" }, { "cve": "CVE-2019-9947", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9947" } ], "notes": [ { "category": "general", "text": "An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \\r\\n (specifically in the path component of a URL that lacks a ? character) followed by an HTTP header or a Redis command. This is similar to the CVE-2019-9740 query string issue. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9947", "url": "https://www.suse.com/security/cve/CVE-2019-9947" }, { "category": "external", "summary": "SUSE Bug 1130840 for CVE-2019-9947", "url": "https://bugzilla.suse.com/1130840" }, { "category": "external", "summary": "SUSE Bug 1136184 for CVE-2019-9947", "url": "https://bugzilla.suse.com/1136184" }, { "category": "external", "summary": "SUSE Bug 1155094 for CVE-2019-9947", "url": "https://bugzilla.suse.com/1155094" }, { "category": "external", "summary": "SUSE Bug 1201559 for CVE-2019-9947", "url": "https://bugzilla.suse.com/1201559" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2019-9947" } ] }
suse-su-2019:2254-1
Vulnerability from csaf_suse
Published
2019-08-29 16:53
Modified
2019-08-29 16:53
Summary
Security update for nodejs10
Notes
Title of the patch
Security update for nodejs10
Description of the patch
This update for nodejs10 to version 10.16.3 fixes the following issues:
Security issues fixed:
- CVE-2019-9511: Fixed HTTP/2 implementations that are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service (bsc#1146091).
- CVE-2019-9512: Fixed HTTP/2 flood using PING frames results in unbounded memory growth (bsc#1146099).
- CVE-2019-9513: Fixed HTTP/2 implementation that is vulnerable to resource loops, potentially leading to a denial of service. (bsc#1146094).
- CVE-2019-9514: Fixed HTTP/2 implementation that is vulnerable to a reset flood, potentially leading to a denial of service (bsc#1146095).
- CVE-2019-9515: Fixed HTTP/2 flood using SETTINGS frames results in unbounded memory growth (bsc#1146100).
- CVE-2019-9516: Fixed HTTP/2 implementation that is vulnerable to a header leak, potentially leading to a denial of service (bsc#1146090).
- CVE-2019-9517: Fixed HTTP/2 implementations that are vulnerable to unconstrained interal data buffering (bsc#1146097).
- CVE-2019-9518: Fixed HTTP/2 implementation that is vulnerable to a flood of empty frames, potentially leading to a denial of service (bsc#1146093).
Patchnames
SUSE-2019-2254,SUSE-SLE-Module-Web-Scripting-12-2019-2254
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for nodejs10", "title": "Title of the patch" }, { "category": "description", "text": "This update for nodejs10 to version 10.16.3 fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2019-9511: Fixed HTTP/2 implementations that are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service (bsc#1146091).\n- CVE-2019-9512: Fixed HTTP/2 flood using PING frames results in unbounded memory growth (bsc#1146099).\n- CVE-2019-9513: Fixed HTTP/2 implementation that is vulnerable to resource loops, potentially leading to a denial of service. (bsc#1146094).\n- CVE-2019-9514: Fixed HTTP/2 implementation that is vulnerable to a reset flood, potentially leading to a denial of service (bsc#1146095).\n- CVE-2019-9515: Fixed HTTP/2 flood using SETTINGS frames results in unbounded memory growth (bsc#1146100).\n- CVE-2019-9516: Fixed HTTP/2 implementation that is vulnerable to a header leak, potentially leading to a denial of service (bsc#1146090).\n- CVE-2019-9517: Fixed HTTP/2 implementations that are vulnerable to unconstrained interal data buffering (bsc#1146097).\n- CVE-2019-9518: Fixed HTTP/2 implementation that is vulnerable to a flood of empty frames, potentially leading to a denial of service (bsc#1146093).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2019-2254,SUSE-SLE-Module-Web-Scripting-12-2019-2254", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_2254-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:2254-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192254-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:2254-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2019-August/005861.html" }, { "category": "self", "summary": "SUSE Bug 1146090", "url": "https://bugzilla.suse.com/1146090" }, { "category": "self", "summary": "SUSE Bug 1146091", "url": "https://bugzilla.suse.com/1146091" }, { "category": "self", "summary": "SUSE Bug 1146093", "url": "https://bugzilla.suse.com/1146093" }, { "category": "self", "summary": "SUSE Bug 1146094", "url": "https://bugzilla.suse.com/1146094" }, { "category": "self", "summary": "SUSE Bug 1146095", "url": "https://bugzilla.suse.com/1146095" }, { "category": "self", "summary": "SUSE Bug 1146097", "url": "https://bugzilla.suse.com/1146097" }, { "category": "self", "summary": "SUSE Bug 1146099", "url": "https://bugzilla.suse.com/1146099" }, { "category": "self", "summary": "SUSE Bug 1146100", "url": "https://bugzilla.suse.com/1146100" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9511 page", "url": "https://www.suse.com/security/cve/CVE-2019-9511/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9512 page", "url": "https://www.suse.com/security/cve/CVE-2019-9512/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9513 page", "url": "https://www.suse.com/security/cve/CVE-2019-9513/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9514 page", "url": "https://www.suse.com/security/cve/CVE-2019-9514/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9515 page", "url": "https://www.suse.com/security/cve/CVE-2019-9515/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9516 page", "url": "https://www.suse.com/security/cve/CVE-2019-9516/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9517 page", "url": "https://www.suse.com/security/cve/CVE-2019-9517/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9518 page", "url": "https://www.suse.com/security/cve/CVE-2019-9518/" } ], "title": "Security update for nodejs10", "tracking": { "current_release_date": "2019-08-29T16:53:45Z", "generator": { "date": "2019-08-29T16:53:45Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:2254-1", "initial_release_date": "2019-08-29T16:53:45Z", "revision_history": [ { "date": "2019-08-29T16:53:45Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "nodejs10-10.16.3-1.12.1.aarch64", "product": { "name": "nodejs10-10.16.3-1.12.1.aarch64", "product_id": "nodejs10-10.16.3-1.12.1.aarch64" } }, { "category": "product_version", "name": "nodejs10-devel-10.16.3-1.12.1.aarch64", "product": { "name": "nodejs10-devel-10.16.3-1.12.1.aarch64", "product_id": "nodejs10-devel-10.16.3-1.12.1.aarch64" } }, { "category": "product_version", "name": "npm10-10.16.3-1.12.1.aarch64", "product": { "name": "npm10-10.16.3-1.12.1.aarch64", "product_id": "npm10-10.16.3-1.12.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "nodejs10-10.16.3-1.12.1.i586", "product": { "name": "nodejs10-10.16.3-1.12.1.i586", "product_id": "nodejs10-10.16.3-1.12.1.i586" } }, { "category": "product_version", "name": "nodejs10-devel-10.16.3-1.12.1.i586", "product": { "name": "nodejs10-devel-10.16.3-1.12.1.i586", "product_id": "nodejs10-devel-10.16.3-1.12.1.i586" } }, { "category": "product_version", "name": "npm10-10.16.3-1.12.1.i586", "product": { "name": "npm10-10.16.3-1.12.1.i586", "product_id": "npm10-10.16.3-1.12.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "nodejs10-docs-10.16.3-1.12.1.noarch", "product": { "name": "nodejs10-docs-10.16.3-1.12.1.noarch", "product_id": "nodejs10-docs-10.16.3-1.12.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "nodejs10-10.16.3-1.12.1.ppc64le", "product": { "name": "nodejs10-10.16.3-1.12.1.ppc64le", "product_id": "nodejs10-10.16.3-1.12.1.ppc64le" } }, { "category": "product_version", "name": "nodejs10-devel-10.16.3-1.12.1.ppc64le", "product": { "name": "nodejs10-devel-10.16.3-1.12.1.ppc64le", "product_id": "nodejs10-devel-10.16.3-1.12.1.ppc64le" } }, { "category": "product_version", "name": "npm10-10.16.3-1.12.1.ppc64le", "product": { "name": "npm10-10.16.3-1.12.1.ppc64le", "product_id": "npm10-10.16.3-1.12.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "nodejs10-10.16.3-1.12.1.s390", "product": { "name": "nodejs10-10.16.3-1.12.1.s390", "product_id": "nodejs10-10.16.3-1.12.1.s390" } }, { "category": "product_version", "name": "nodejs10-devel-10.16.3-1.12.1.s390", "product": { "name": "nodejs10-devel-10.16.3-1.12.1.s390", "product_id": "nodejs10-devel-10.16.3-1.12.1.s390" } }, { "category": "product_version", "name": "npm10-10.16.3-1.12.1.s390", "product": { "name": "npm10-10.16.3-1.12.1.s390", "product_id": "npm10-10.16.3-1.12.1.s390" } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "nodejs10-10.16.3-1.12.1.s390x", "product": { "name": "nodejs10-10.16.3-1.12.1.s390x", "product_id": "nodejs10-10.16.3-1.12.1.s390x" } }, { "category": "product_version", "name": "nodejs10-devel-10.16.3-1.12.1.s390x", "product": { "name": "nodejs10-devel-10.16.3-1.12.1.s390x", "product_id": "nodejs10-devel-10.16.3-1.12.1.s390x" } }, { "category": "product_version", "name": "npm10-10.16.3-1.12.1.s390x", "product": { "name": "npm10-10.16.3-1.12.1.s390x", "product_id": "npm10-10.16.3-1.12.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "nodejs10-10.16.3-1.12.1.x86_64", "product": { "name": "nodejs10-10.16.3-1.12.1.x86_64", "product_id": "nodejs10-10.16.3-1.12.1.x86_64" } }, { "category": "product_version", "name": "nodejs10-devel-10.16.3-1.12.1.x86_64", "product": { "name": "nodejs10-devel-10.16.3-1.12.1.x86_64", "product_id": "nodejs10-devel-10.16.3-1.12.1.x86_64" } }, { "category": "product_version", "name": "npm10-10.16.3-1.12.1.x86_64", "product": { "name": "npm10-10.16.3-1.12.1.x86_64", "product_id": "npm10-10.16.3-1.12.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Web and Scripting 12", "product": { "name": "SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-web-scripting:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.16.3-1.12.1.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.aarch64" }, "product_reference": "nodejs10-10.16.3-1.12.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.16.3-1.12.1.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.ppc64le" }, "product_reference": "nodejs10-10.16.3-1.12.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.16.3-1.12.1.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.s390x" }, "product_reference": "nodejs10-10.16.3-1.12.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.16.3-1.12.1.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.x86_64" }, "product_reference": "nodejs10-10.16.3-1.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.16.3-1.12.1.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.aarch64" }, "product_reference": "nodejs10-devel-10.16.3-1.12.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.16.3-1.12.1.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.ppc64le" }, "product_reference": "nodejs10-devel-10.16.3-1.12.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.16.3-1.12.1.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.s390x" }, "product_reference": "nodejs10-devel-10.16.3-1.12.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.16.3-1.12.1.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.x86_64" }, "product_reference": "nodejs10-devel-10.16.3-1.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-docs-10.16.3-1.12.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.16.3-1.12.1.noarch" }, "product_reference": "nodejs10-docs-10.16.3-1.12.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.16.3-1.12.1.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.aarch64" }, "product_reference": "npm10-10.16.3-1.12.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.16.3-1.12.1.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.ppc64le" }, "product_reference": "npm10-10.16.3-1.12.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.16.3-1.12.1.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.s390x" }, "product_reference": "npm10-10.16.3-1.12.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.16.3-1.12.1.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.x86_64" }, "product_reference": "npm10-10.16.3-1.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-9511", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9511" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9511", "url": "https://www.suse.com/security/cve/CVE-2019-9511" }, { "category": "external", "summary": "SUSE Bug 1145579 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1145579" }, { "category": "external", "summary": "SUSE Bug 1146091 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1146091" }, { "category": "external", "summary": "SUSE Bug 1146182 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1146182" }, { "category": "external", "summary": "SUSE Bug 1193427 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1193427" }, { "category": "external", "summary": "SUSE Bug 1202787 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1202787" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-29T16:53:45Z", "details": "low" } ], "title": "CVE-2019-9511" }, { "cve": "CVE-2019-9512", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9512" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9512", "url": "https://www.suse.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146099 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1146099" }, { "category": "external", "summary": "SUSE Bug 1146111 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1146111" }, { "category": "external", "summary": "SUSE Bug 1147142 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1147142" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-29T16:53:45Z", "details": "important" } ], "title": "CVE-2019-9512" }, { "cve": "CVE-2019-9513", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9513" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9513", "url": "https://www.suse.com/security/cve/CVE-2019-9513" }, { "category": "external", "summary": "SUSE Bug 1145580 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1145580" }, { "category": "external", "summary": "SUSE Bug 1146094 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1146094" }, { "category": "external", "summary": "SUSE Bug 1146184 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1146184" }, { "category": "external", "summary": "SUSE Bug 1193427 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1193427" }, { "category": "external", "summary": "SUSE Bug 1202787 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1202787" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-29T16:53:45Z", "details": "low" } ], "title": "CVE-2019-9513" }, { "cve": "CVE-2019-9514", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9514" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9514", "url": "https://www.suse.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "SUSE Bug 1145662 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1145662" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146095 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1146095" }, { "category": "external", "summary": "SUSE Bug 1146115 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1146115" }, { "category": "external", "summary": "SUSE Bug 1147142 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1147142" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-29T16:53:45Z", "details": "important" } ], "title": "CVE-2019-9514" }, { "cve": "CVE-2019-9515", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9515" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to a settings flood, potentially leading to a denial of service. The attacker sends a stream of SETTINGS frames to the peer. Since the RFC requires that the peer reply with one acknowledgement per SETTINGS frame, an empty SETTINGS frame is almost equivalent in behavior to a ping. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9515", "url": "https://www.suse.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9515", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146100 for CVE-2019-9515", "url": "https://bugzilla.suse.com/1146100" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-29T16:53:45Z", "details": "important" } ], "title": "CVE-2019-9515" }, { "cve": "CVE-2019-9516", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9516" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service. The attacker sends a stream of headers with a 0-length header name and 0-length header value, optionally Huffman encoded into 1-byte or greater headers. Some implementations allocate memory for these headers and keep the allocation alive until the session dies. This can consume excess memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9516", "url": "https://www.suse.com/security/cve/CVE-2019-9516" }, { "category": "external", "summary": "SUSE Bug 1145582 for CVE-2019-9516", "url": "https://bugzilla.suse.com/1145582" }, { "category": "external", "summary": "SUSE Bug 1146090 for CVE-2019-9516", "url": "https://bugzilla.suse.com/1146090" }, { "category": "external", "summary": "SUSE Bug 1193427 for CVE-2019-9516", "url": "https://bugzilla.suse.com/1193427" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-29T16:53:45Z", "details": "low" } ], "title": "CVE-2019-9516" }, { "cve": "CVE-2019-9517", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9517" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to unconstrained interal data buffering, potentially leading to a denial of service. The attacker opens the HTTP/2 window so the peer can send without constraint; however, they leave the TCP window closed so the peer cannot actually write (many of) the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the servers queue the responses, this can consume excess memory, CPU, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9517", "url": "https://www.suse.com/security/cve/CVE-2019-9517" }, { "category": "external", "summary": "SUSE Bug 1145575 for CVE-2019-9517", "url": "https://bugzilla.suse.com/1145575" }, { "category": "external", "summary": "SUSE Bug 1146097 for CVE-2019-9517", "url": "https://bugzilla.suse.com/1146097" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-29T16:53:45Z", "details": "moderate" } ], "title": "CVE-2019-9517" }, { "cve": "CVE-2019-9518", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9518" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leading to a denial of service. The attacker sends a stream of frames with an empty payload and without the end-of-stream flag. These frames can be DATA, HEADERS, CONTINUATION and/or PUSH_PROMISE. The peer spends time processing each frame disproportionate to attack bandwidth. This can consume excess CPU.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9518", "url": "https://www.suse.com/security/cve/CVE-2019-9518" }, { "category": "external", "summary": "SUSE Bug 1145662 for CVE-2019-9518", "url": "https://bugzilla.suse.com/1145662" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9518", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146093 for CVE-2019-9518", "url": "https://bugzilla.suse.com/1146093" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-29T16:53:45Z", "details": "important" } ], "title": "CVE-2019-9518" } ] }
suse-su-2019:2237-1
Vulnerability from csaf_suse
Published
2019-08-28 06:00
Modified
2019-08-28 06:00
Summary
Security update for apache2
Notes
Title of the patch
Security update for apache2
Description of the patch
This update for apache2 fixes the following issues:
Security issues fixed:
- CVE-2019-9517: Fixed HTTP/2 implementations that are vulnerable to unconstrained interal data buffering (bsc#1145575).
- CVE-2019-10081: Fixed mod_http2 that is vulnerable to memory corruption on early pushes (bsc#1145742).
- CVE-2019-10082: Fixed mod_http2 that is vulnerable to read-after-free in h2 connection shutdown (bsc#1145741).
- CVE-2019-10092: Fixed limited cross-site scripting in mod_proxy (bsc#1145740).
- CVE-2019-10097: Fixed mod_remoteip stack buffer overflow and NULL pointer dereference (bsc#1145739).
- CVE-2019-10098: Fixed mod_rewrite configuration vulnerablility to open redirect (bsc#1145738).
Patchnames
SUSE-2019-2237,SUSE-SLE-Module-Development-Tools-OBS-15-2019-2237,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2237,SUSE-SLE-Module-Server-Applications-15-2019-2237,SUSE-SLE-Module-Server-Applications-15-SP1-2019-2237
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for apache2", "title": "Title of the patch" }, { "category": "description", "text": "This update for apache2 fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2019-9517: Fixed HTTP/2 implementations that are vulnerable to unconstrained interal data buffering (bsc#1145575).\n- CVE-2019-10081: Fixed mod_http2 that is vulnerable to memory corruption on early pushes (bsc#1145742).\n- CVE-2019-10082: Fixed mod_http2 that is vulnerable to read-after-free in h2 connection shutdown (bsc#1145741).\n- CVE-2019-10092: Fixed limited cross-site scripting in mod_proxy (bsc#1145740).\n- CVE-2019-10097: Fixed mod_remoteip stack buffer overflow and NULL pointer dereference (bsc#1145739).\n- CVE-2019-10098: Fixed mod_rewrite configuration vulnerablility to open redirect (bsc#1145738).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2019-2237,SUSE-SLE-Module-Development-Tools-OBS-15-2019-2237,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2237,SUSE-SLE-Module-Server-Applications-15-2019-2237,SUSE-SLE-Module-Server-Applications-15-SP1-2019-2237", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_2237-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:2237-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192237-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:2237-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2019-August/005849.html" }, { "category": "self", "summary": "SUSE Bug 1145575", "url": "https://bugzilla.suse.com/1145575" }, { "category": "self", "summary": "SUSE Bug 1145738", "url": "https://bugzilla.suse.com/1145738" }, { "category": "self", "summary": "SUSE Bug 1145739", "url": "https://bugzilla.suse.com/1145739" }, { "category": "self", "summary": "SUSE Bug 1145740", "url": "https://bugzilla.suse.com/1145740" }, { "category": "self", "summary": "SUSE Bug 1145741", "url": "https://bugzilla.suse.com/1145741" }, { "category": "self", "summary": "SUSE Bug 1145742", "url": "https://bugzilla.suse.com/1145742" }, { "category": "self", "summary": "SUSE CVE CVE-2019-10081 page", "url": "https://www.suse.com/security/cve/CVE-2019-10081/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-10082 page", "url": "https://www.suse.com/security/cve/CVE-2019-10082/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-10092 page", "url": "https://www.suse.com/security/cve/CVE-2019-10092/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-10097 page", "url": "https://www.suse.com/security/cve/CVE-2019-10097/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-10098 page", "url": "https://www.suse.com/security/cve/CVE-2019-10098/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9517 page", "url": "https://www.suse.com/security/cve/CVE-2019-9517/" } ], "title": "Security update for apache2", "tracking": { "current_release_date": "2019-08-28T06:00:33Z", "generator": { "date": "2019-08-28T06:00:33Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:2237-1", "initial_release_date": "2019-08-28T06:00:33Z", "revision_history": [ { "date": "2019-08-28T06:00:33Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "apache2-2.4.33-3.21.1.aarch64", "product": { "name": "apache2-2.4.33-3.21.1.aarch64", "product_id": "apache2-2.4.33-3.21.1.aarch64" } }, { "category": "product_version", "name": "apache2-devel-2.4.33-3.21.1.aarch64", "product": { "name": "apache2-devel-2.4.33-3.21.1.aarch64", "product_id": "apache2-devel-2.4.33-3.21.1.aarch64" } }, { "category": "product_version", "name": "apache2-event-2.4.33-3.21.1.aarch64", "product": { "name": "apache2-event-2.4.33-3.21.1.aarch64", "product_id": "apache2-event-2.4.33-3.21.1.aarch64" } }, { "category": "product_version", "name": "apache2-example-pages-2.4.33-3.21.1.aarch64", "product": { "name": "apache2-example-pages-2.4.33-3.21.1.aarch64", "product_id": "apache2-example-pages-2.4.33-3.21.1.aarch64" } }, { "category": "product_version", "name": "apache2-prefork-2.4.33-3.21.1.aarch64", "product": { "name": "apache2-prefork-2.4.33-3.21.1.aarch64", "product_id": "apache2-prefork-2.4.33-3.21.1.aarch64" } }, { "category": "product_version", "name": "apache2-utils-2.4.33-3.21.1.aarch64", "product": { "name": "apache2-utils-2.4.33-3.21.1.aarch64", "product_id": "apache2-utils-2.4.33-3.21.1.aarch64" } }, { "category": "product_version", "name": "apache2-worker-2.4.33-3.21.1.aarch64", "product": { "name": "apache2-worker-2.4.33-3.21.1.aarch64", "product_id": "apache2-worker-2.4.33-3.21.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "apache2-2.4.33-3.21.1.i586", "product": { "name": "apache2-2.4.33-3.21.1.i586", "product_id": "apache2-2.4.33-3.21.1.i586" } }, { "category": "product_version", "name": "apache2-devel-2.4.33-3.21.1.i586", "product": { "name": "apache2-devel-2.4.33-3.21.1.i586", "product_id": "apache2-devel-2.4.33-3.21.1.i586" } }, { "category": "product_version", "name": "apache2-event-2.4.33-3.21.1.i586", "product": { "name": "apache2-event-2.4.33-3.21.1.i586", "product_id": "apache2-event-2.4.33-3.21.1.i586" } }, { "category": "product_version", "name": "apache2-example-pages-2.4.33-3.21.1.i586", "product": { "name": "apache2-example-pages-2.4.33-3.21.1.i586", "product_id": "apache2-example-pages-2.4.33-3.21.1.i586" } }, { "category": "product_version", "name": "apache2-prefork-2.4.33-3.21.1.i586", "product": { "name": "apache2-prefork-2.4.33-3.21.1.i586", "product_id": "apache2-prefork-2.4.33-3.21.1.i586" } }, { "category": "product_version", "name": "apache2-utils-2.4.33-3.21.1.i586", "product": { "name": "apache2-utils-2.4.33-3.21.1.i586", "product_id": "apache2-utils-2.4.33-3.21.1.i586" } }, { "category": "product_version", "name": "apache2-worker-2.4.33-3.21.1.i586", "product": { "name": "apache2-worker-2.4.33-3.21.1.i586", "product_id": "apache2-worker-2.4.33-3.21.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "apache2-doc-2.4.33-3.21.1.noarch", "product": { "name": "apache2-doc-2.4.33-3.21.1.noarch", "product_id": "apache2-doc-2.4.33-3.21.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "apache2-2.4.33-3.21.1.ppc64le", "product": { "name": "apache2-2.4.33-3.21.1.ppc64le", "product_id": "apache2-2.4.33-3.21.1.ppc64le" } }, { "category": "product_version", "name": "apache2-devel-2.4.33-3.21.1.ppc64le", "product": { "name": "apache2-devel-2.4.33-3.21.1.ppc64le", "product_id": "apache2-devel-2.4.33-3.21.1.ppc64le" } }, { "category": "product_version", "name": "apache2-event-2.4.33-3.21.1.ppc64le", "product": { "name": "apache2-event-2.4.33-3.21.1.ppc64le", "product_id": "apache2-event-2.4.33-3.21.1.ppc64le" } }, { "category": "product_version", "name": "apache2-example-pages-2.4.33-3.21.1.ppc64le", "product": { "name": "apache2-example-pages-2.4.33-3.21.1.ppc64le", "product_id": "apache2-example-pages-2.4.33-3.21.1.ppc64le" } }, { "category": "product_version", "name": "apache2-prefork-2.4.33-3.21.1.ppc64le", "product": { "name": "apache2-prefork-2.4.33-3.21.1.ppc64le", "product_id": "apache2-prefork-2.4.33-3.21.1.ppc64le" } }, { "category": "product_version", "name": "apache2-utils-2.4.33-3.21.1.ppc64le", "product": { "name": "apache2-utils-2.4.33-3.21.1.ppc64le", "product_id": "apache2-utils-2.4.33-3.21.1.ppc64le" } }, { "category": "product_version", "name": "apache2-worker-2.4.33-3.21.1.ppc64le", "product": { "name": "apache2-worker-2.4.33-3.21.1.ppc64le", "product_id": "apache2-worker-2.4.33-3.21.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "apache2-2.4.33-3.21.1.s390x", "product": { "name": "apache2-2.4.33-3.21.1.s390x", "product_id": "apache2-2.4.33-3.21.1.s390x" } }, { "category": "product_version", "name": "apache2-devel-2.4.33-3.21.1.s390x", "product": { "name": "apache2-devel-2.4.33-3.21.1.s390x", "product_id": "apache2-devel-2.4.33-3.21.1.s390x" } }, { "category": "product_version", "name": "apache2-event-2.4.33-3.21.1.s390x", "product": { "name": "apache2-event-2.4.33-3.21.1.s390x", "product_id": "apache2-event-2.4.33-3.21.1.s390x" } }, { "category": "product_version", "name": "apache2-example-pages-2.4.33-3.21.1.s390x", "product": { "name": "apache2-example-pages-2.4.33-3.21.1.s390x", "product_id": "apache2-example-pages-2.4.33-3.21.1.s390x" } }, { "category": "product_version", "name": "apache2-prefork-2.4.33-3.21.1.s390x", "product": { "name": "apache2-prefork-2.4.33-3.21.1.s390x", "product_id": "apache2-prefork-2.4.33-3.21.1.s390x" } }, { "category": "product_version", "name": "apache2-utils-2.4.33-3.21.1.s390x", "product": { "name": "apache2-utils-2.4.33-3.21.1.s390x", "product_id": "apache2-utils-2.4.33-3.21.1.s390x" } }, { "category": "product_version", "name": "apache2-worker-2.4.33-3.21.1.s390x", "product": { "name": "apache2-worker-2.4.33-3.21.1.s390x", "product_id": "apache2-worker-2.4.33-3.21.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "apache2-2.4.33-3.21.1.x86_64", "product": { "name": "apache2-2.4.33-3.21.1.x86_64", "product_id": "apache2-2.4.33-3.21.1.x86_64" } }, { "category": "product_version", "name": "apache2-devel-2.4.33-3.21.1.x86_64", "product": { "name": "apache2-devel-2.4.33-3.21.1.x86_64", "product_id": "apache2-devel-2.4.33-3.21.1.x86_64" } }, { "category": "product_version", "name": "apache2-event-2.4.33-3.21.1.x86_64", "product": { "name": "apache2-event-2.4.33-3.21.1.x86_64", "product_id": "apache2-event-2.4.33-3.21.1.x86_64" } }, { "category": "product_version", "name": "apache2-example-pages-2.4.33-3.21.1.x86_64", "product": { "name": "apache2-example-pages-2.4.33-3.21.1.x86_64", "product_id": "apache2-example-pages-2.4.33-3.21.1.x86_64" } }, { "category": "product_version", "name": "apache2-prefork-2.4.33-3.21.1.x86_64", "product": { "name": "apache2-prefork-2.4.33-3.21.1.x86_64", "product_id": "apache2-prefork-2.4.33-3.21.1.x86_64" } }, { "category": "product_version", "name": "apache2-utils-2.4.33-3.21.1.x86_64", "product": { "name": "apache2-utils-2.4.33-3.21.1.x86_64", "product_id": "apache2-utils-2.4.33-3.21.1.x86_64" } }, { "category": "product_version", "name": "apache2-worker-2.4.33-3.21.1.x86_64", "product": { "name": "apache2-worker-2.4.33-3.21.1.x86_64", "product_id": "apache2-worker-2.4.33-3.21.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Server Applications 15", "product": { "name": "SUSE Linux Enterprise Module for Server Applications 15", "product_id": "SUSE Linux Enterprise Module for Server Applications 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-server-applications:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Server Applications 15 SP1", "product": { "name": "SUSE Linux Enterprise Module for Server Applications 15 SP1", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-server-applications:15:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "apache2-2.4.33-3.21.1.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15", "product_id": "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.21.1.aarch64" }, "product_reference": "apache2-2.4.33-3.21.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-2.4.33-3.21.1.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15", "product_id": "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.21.1.ppc64le" }, "product_reference": "apache2-2.4.33-3.21.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-2.4.33-3.21.1.s390x as component of SUSE Linux Enterprise Module for Server Applications 15", "product_id": "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.21.1.s390x" }, "product_reference": "apache2-2.4.33-3.21.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-2.4.33-3.21.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15", "product_id": "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.21.1.x86_64" }, "product_reference": "apache2-2.4.33-3.21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-devel-2.4.33-3.21.1.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15", "product_id": "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.21.1.aarch64" }, "product_reference": "apache2-devel-2.4.33-3.21.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-devel-2.4.33-3.21.1.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15", "product_id": "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.21.1.ppc64le" }, "product_reference": "apache2-devel-2.4.33-3.21.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-devel-2.4.33-3.21.1.s390x as component of SUSE Linux Enterprise Module for Server Applications 15", "product_id": "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.21.1.s390x" }, "product_reference": "apache2-devel-2.4.33-3.21.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-devel-2.4.33-3.21.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15", "product_id": "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.21.1.x86_64" }, "product_reference": "apache2-devel-2.4.33-3.21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-doc-2.4.33-3.21.1.noarch as component of SUSE Linux Enterprise Module for Server Applications 15", "product_id": "SUSE Linux Enterprise Module for Server Applications 15:apache2-doc-2.4.33-3.21.1.noarch" }, "product_reference": "apache2-doc-2.4.33-3.21.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-prefork-2.4.33-3.21.1.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15", "product_id": "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.21.1.aarch64" }, "product_reference": "apache2-prefork-2.4.33-3.21.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-prefork-2.4.33-3.21.1.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15", "product_id": "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.21.1.ppc64le" }, "product_reference": "apache2-prefork-2.4.33-3.21.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-prefork-2.4.33-3.21.1.s390x as component of SUSE Linux Enterprise Module for Server Applications 15", "product_id": "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.21.1.s390x" }, "product_reference": "apache2-prefork-2.4.33-3.21.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-prefork-2.4.33-3.21.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15", "product_id": "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.21.1.x86_64" }, "product_reference": "apache2-prefork-2.4.33-3.21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-utils-2.4.33-3.21.1.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15", "product_id": "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.21.1.aarch64" }, "product_reference": "apache2-utils-2.4.33-3.21.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-utils-2.4.33-3.21.1.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15", "product_id": "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.21.1.ppc64le" }, "product_reference": "apache2-utils-2.4.33-3.21.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-utils-2.4.33-3.21.1.s390x as component of SUSE Linux Enterprise Module for Server Applications 15", "product_id": "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.21.1.s390x" }, "product_reference": "apache2-utils-2.4.33-3.21.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-utils-2.4.33-3.21.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15", "product_id": "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.21.1.x86_64" }, "product_reference": "apache2-utils-2.4.33-3.21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-worker-2.4.33-3.21.1.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15", "product_id": "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.21.1.aarch64" }, "product_reference": "apache2-worker-2.4.33-3.21.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-worker-2.4.33-3.21.1.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15", "product_id": "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.21.1.ppc64le" }, "product_reference": "apache2-worker-2.4.33-3.21.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-worker-2.4.33-3.21.1.s390x as component of SUSE Linux Enterprise Module for Server Applications 15", "product_id": "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.21.1.s390x" }, "product_reference": "apache2-worker-2.4.33-3.21.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-worker-2.4.33-3.21.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15", "product_id": "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.21.1.x86_64" }, "product_reference": "apache2-worker-2.4.33-3.21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-2.4.33-3.21.1.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP1", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-2.4.33-3.21.1.aarch64" }, "product_reference": "apache2-2.4.33-3.21.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-2.4.33-3.21.1.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15 SP1", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-2.4.33-3.21.1.ppc64le" }, "product_reference": "apache2-2.4.33-3.21.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-2.4.33-3.21.1.s390x as component of SUSE Linux Enterprise Module for Server Applications 15 SP1", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-2.4.33-3.21.1.s390x" }, "product_reference": "apache2-2.4.33-3.21.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-2.4.33-3.21.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP1", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-2.4.33-3.21.1.x86_64" }, "product_reference": "apache2-2.4.33-3.21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-devel-2.4.33-3.21.1.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP1", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-devel-2.4.33-3.21.1.aarch64" }, "product_reference": "apache2-devel-2.4.33-3.21.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-devel-2.4.33-3.21.1.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15 SP1", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-devel-2.4.33-3.21.1.ppc64le" }, "product_reference": "apache2-devel-2.4.33-3.21.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-devel-2.4.33-3.21.1.s390x as component of SUSE Linux Enterprise Module for Server Applications 15 SP1", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-devel-2.4.33-3.21.1.s390x" }, "product_reference": "apache2-devel-2.4.33-3.21.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-devel-2.4.33-3.21.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP1", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-devel-2.4.33-3.21.1.x86_64" }, "product_reference": "apache2-devel-2.4.33-3.21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-doc-2.4.33-3.21.1.noarch as component of SUSE Linux Enterprise Module for Server Applications 15 SP1", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-doc-2.4.33-3.21.1.noarch" }, "product_reference": "apache2-doc-2.4.33-3.21.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-prefork-2.4.33-3.21.1.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP1", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-prefork-2.4.33-3.21.1.aarch64" }, "product_reference": "apache2-prefork-2.4.33-3.21.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-prefork-2.4.33-3.21.1.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15 SP1", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-prefork-2.4.33-3.21.1.ppc64le" }, "product_reference": "apache2-prefork-2.4.33-3.21.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-prefork-2.4.33-3.21.1.s390x as component of SUSE Linux Enterprise Module for Server Applications 15 SP1", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-prefork-2.4.33-3.21.1.s390x" }, "product_reference": "apache2-prefork-2.4.33-3.21.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-prefork-2.4.33-3.21.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP1", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-prefork-2.4.33-3.21.1.x86_64" }, "product_reference": "apache2-prefork-2.4.33-3.21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-utils-2.4.33-3.21.1.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP1", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-utils-2.4.33-3.21.1.aarch64" }, "product_reference": "apache2-utils-2.4.33-3.21.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-utils-2.4.33-3.21.1.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15 SP1", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-utils-2.4.33-3.21.1.ppc64le" }, "product_reference": "apache2-utils-2.4.33-3.21.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-utils-2.4.33-3.21.1.s390x as component of SUSE Linux Enterprise Module for Server Applications 15 SP1", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-utils-2.4.33-3.21.1.s390x" }, "product_reference": "apache2-utils-2.4.33-3.21.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-utils-2.4.33-3.21.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP1", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-utils-2.4.33-3.21.1.x86_64" }, "product_reference": "apache2-utils-2.4.33-3.21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-worker-2.4.33-3.21.1.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP1", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-worker-2.4.33-3.21.1.aarch64" }, "product_reference": "apache2-worker-2.4.33-3.21.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-worker-2.4.33-3.21.1.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15 SP1", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-worker-2.4.33-3.21.1.ppc64le" }, "product_reference": "apache2-worker-2.4.33-3.21.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-worker-2.4.33-3.21.1.s390x as component of SUSE Linux Enterprise Module for Server Applications 15 SP1", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-worker-2.4.33-3.21.1.s390x" }, "product_reference": "apache2-worker-2.4.33-3.21.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-worker-2.4.33-3.21.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP1", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-worker-2.4.33-3.21.1.x86_64" }, "product_reference": "apache2-worker-2.4.33-3.21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP1" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-10081", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-10081" } ], "notes": [ { "category": "general", "text": "HTTP/2 (2.4.20 through 2.4.39) very early pushes, for example configured with \"H2PushResource\", could lead to an overwrite of memory in the pushing request\u0027s pool, leading to crashes. The memory copied is that of the configured push link header values, not data supplied by the client.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-devel-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-devel-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-devel-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-devel-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-doc-2.4.33-3.21.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-prefork-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-prefork-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-prefork-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-prefork-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-utils-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-utils-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-utils-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-utils-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-worker-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-worker-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-worker-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-worker-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-doc-2.4.33-3.21.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.21.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-10081", "url": "https://www.suse.com/security/cve/CVE-2019-10081" }, { "category": "external", "summary": "SUSE Bug 1145742 for CVE-2019-10081", "url": "https://bugzilla.suse.com/1145742" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-devel-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-devel-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-devel-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-devel-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-doc-2.4.33-3.21.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-prefork-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-prefork-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-prefork-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-prefork-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-utils-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-utils-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-utils-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-utils-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-worker-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-worker-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-worker-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-worker-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-doc-2.4.33-3.21.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.21.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-devel-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-devel-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-devel-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-devel-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-doc-2.4.33-3.21.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-prefork-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-prefork-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-prefork-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-prefork-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-utils-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-utils-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-utils-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-utils-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-worker-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-worker-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-worker-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-worker-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-doc-2.4.33-3.21.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.21.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-28T06:00:33Z", "details": "moderate" } ], "title": "CVE-2019-10081" }, { "cve": "CVE-2019-10082", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-10082" } ], "notes": [ { "category": "general", "text": "In Apache HTTP Server 2.4.18-2.4.39, using fuzzed network input, the http/2 session handling could be made to read memory after being freed, during connection shutdown.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-devel-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-devel-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-devel-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-devel-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-doc-2.4.33-3.21.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-prefork-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-prefork-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-prefork-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-prefork-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-utils-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-utils-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-utils-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-utils-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-worker-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-worker-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-worker-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-worker-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-doc-2.4.33-3.21.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.21.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-10082", "url": "https://www.suse.com/security/cve/CVE-2019-10082" }, { "category": "external", "summary": "SUSE Bug 1145741 for CVE-2019-10082", "url": "https://bugzilla.suse.com/1145741" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-devel-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-devel-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-devel-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-devel-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-doc-2.4.33-3.21.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-prefork-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-prefork-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-prefork-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-prefork-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-utils-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-utils-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-utils-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-utils-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-worker-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-worker-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-worker-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-worker-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-doc-2.4.33-3.21.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.21.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-devel-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-devel-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-devel-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-devel-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-doc-2.4.33-3.21.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-prefork-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-prefork-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-prefork-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-prefork-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-utils-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-utils-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-utils-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-utils-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-worker-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-worker-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-worker-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-worker-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-doc-2.4.33-3.21.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.21.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-28T06:00:33Z", "details": "moderate" } ], "title": "CVE-2019-10082" }, { "cve": "CVE-2019-10092", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-10092" } ], "notes": [ { "category": "general", "text": "In Apache HTTP Server 2.4.0-2.4.39, a limited cross-site scripting issue was reported affecting the mod_proxy error page. An attacker could cause the link on the error page to be malformed and instead point to a page of their choice. This would only be exploitable where a server was set up with proxying enabled but was misconfigured in such a way that the Proxy Error page was displayed.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-devel-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-devel-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-devel-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-devel-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-doc-2.4.33-3.21.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-prefork-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-prefork-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-prefork-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-prefork-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-utils-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-utils-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-utils-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-utils-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-worker-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-worker-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-worker-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-worker-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-doc-2.4.33-3.21.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.21.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-10092", "url": "https://www.suse.com/security/cve/CVE-2019-10092" }, { "category": "external", "summary": "SUSE Bug 1145740 for CVE-2019-10092", "url": "https://bugzilla.suse.com/1145740" }, { "category": "external", "summary": "SUSE Bug 1182703 for CVE-2019-10092", "url": "https://bugzilla.suse.com/1182703" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-devel-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-devel-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-devel-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-devel-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-doc-2.4.33-3.21.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-prefork-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-prefork-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-prefork-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-prefork-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-utils-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-utils-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-utils-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-utils-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-worker-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-worker-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-worker-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-worker-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-doc-2.4.33-3.21.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.21.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-devel-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-devel-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-devel-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-devel-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-doc-2.4.33-3.21.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-prefork-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-prefork-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-prefork-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-prefork-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-utils-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-utils-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-utils-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-utils-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-worker-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-worker-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-worker-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-worker-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-doc-2.4.33-3.21.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.21.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-28T06:00:33Z", "details": "important" } ], "title": "CVE-2019-10092" }, { "cve": "CVE-2019-10097", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-10097" } ], "notes": [ { "category": "general", "text": "In Apache HTTP Server 2.4.32-2.4.39, when mod_remoteip was configured to use a trusted intermediary proxy server using the \"PROXY\" protocol, a specially crafted PROXY header could trigger a stack buffer overflow or NULL pointer deference. This vulnerability could only be triggered by a trusted proxy and not by untrusted HTTP clients.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-devel-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-devel-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-devel-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-devel-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-doc-2.4.33-3.21.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-prefork-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-prefork-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-prefork-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-prefork-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-utils-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-utils-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-utils-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-utils-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-worker-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-worker-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-worker-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-worker-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-doc-2.4.33-3.21.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.21.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-10097", "url": "https://www.suse.com/security/cve/CVE-2019-10097" }, { "category": "external", "summary": "SUSE Bug 1145739 for CVE-2019-10097", "url": "https://bugzilla.suse.com/1145739" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-devel-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-devel-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-devel-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-devel-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-doc-2.4.33-3.21.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-prefork-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-prefork-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-prefork-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-prefork-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-utils-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-utils-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-utils-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-utils-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-worker-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-worker-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-worker-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-worker-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-doc-2.4.33-3.21.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.21.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-devel-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-devel-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-devel-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-devel-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-doc-2.4.33-3.21.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-prefork-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-prefork-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-prefork-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-prefork-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-utils-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-utils-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-utils-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-utils-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-worker-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-worker-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-worker-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-worker-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-doc-2.4.33-3.21.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.21.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-28T06:00:33Z", "details": "moderate" } ], "title": "CVE-2019-10097" }, { "cve": "CVE-2019-10098", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-10098" } ], "notes": [ { "category": "general", "text": "In Apache HTTP server 2.4.0 to 2.4.39, Redirects configured with mod_rewrite that were intended to be self-referential might be fooled by encoded newlines and redirect instead to an unexpected URL within the request URL.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-devel-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-devel-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-devel-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-devel-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-doc-2.4.33-3.21.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-prefork-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-prefork-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-prefork-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-prefork-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-utils-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-utils-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-utils-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-utils-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-worker-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-worker-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-worker-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-worker-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-doc-2.4.33-3.21.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.21.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-10098", "url": "https://www.suse.com/security/cve/CVE-2019-10098" }, { "category": "external", "summary": "SUSE Bug 1145738 for CVE-2019-10098", "url": "https://bugzilla.suse.com/1145738" }, { "category": "external", "summary": "SUSE Bug 1168407 for CVE-2019-10098", "url": "https://bugzilla.suse.com/1168407" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-devel-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-devel-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-devel-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-devel-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-doc-2.4.33-3.21.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-prefork-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-prefork-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-prefork-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-prefork-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-utils-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-utils-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-utils-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-utils-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-worker-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-worker-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-worker-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-worker-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-doc-2.4.33-3.21.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.21.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-devel-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-devel-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-devel-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-devel-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-doc-2.4.33-3.21.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-prefork-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-prefork-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-prefork-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-prefork-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-utils-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-utils-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-utils-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-utils-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-worker-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-worker-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-worker-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-worker-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-doc-2.4.33-3.21.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.21.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-28T06:00:33Z", "details": "important" } ], "title": "CVE-2019-10098" }, { "cve": "CVE-2019-9517", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9517" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to unconstrained interal data buffering, potentially leading to a denial of service. The attacker opens the HTTP/2 window so the peer can send without constraint; however, they leave the TCP window closed so the peer cannot actually write (many of) the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the servers queue the responses, this can consume excess memory, CPU, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-devel-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-devel-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-devel-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-devel-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-doc-2.4.33-3.21.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-prefork-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-prefork-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-prefork-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-prefork-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-utils-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-utils-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-utils-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-utils-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-worker-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-worker-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-worker-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-worker-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-doc-2.4.33-3.21.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.21.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9517", "url": "https://www.suse.com/security/cve/CVE-2019-9517" }, { "category": "external", "summary": "SUSE Bug 1145575 for CVE-2019-9517", "url": "https://bugzilla.suse.com/1145575" }, { "category": "external", "summary": "SUSE Bug 1146097 for CVE-2019-9517", "url": "https://bugzilla.suse.com/1146097" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-devel-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-devel-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-devel-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-devel-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-doc-2.4.33-3.21.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-prefork-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-prefork-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-prefork-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-prefork-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-utils-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-utils-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-utils-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-utils-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-worker-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-worker-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-worker-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-worker-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-doc-2.4.33-3.21.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.21.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-devel-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-devel-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-devel-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-devel-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-doc-2.4.33-3.21.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-prefork-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-prefork-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-prefork-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-prefork-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-utils-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-utils-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-utils-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-utils-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-worker-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-worker-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-worker-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15 SP1:apache2-worker-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-devel-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-doc-2.4.33-3.21.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-prefork-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-utils-2.4.33-3.21.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.21.1.aarch64", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.21.1.ppc64le", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.21.1.s390x", "SUSE Linux Enterprise Module for Server Applications 15:apache2-worker-2.4.33-3.21.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-28T06:00:33Z", "details": "moderate" } ], "title": "CVE-2019-9517" } ] }
suse-su-2019:2259-1
Vulnerability from csaf_suse
Published
2019-09-02 07:04
Modified
2019-09-02 07:04
Summary
Security update for nodejs10
Notes
Title of the patch
Security update for nodejs10
Description of the patch
This update for nodejs10 to version 10.16.3 fixes the following issues:
Security issues fixed:
- CVE-2019-9511: Fixed HTTP/2 implementations that are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service (bsc#1146091).
- CVE-2019-9512: Fixed HTTP/2 flood using PING frames results in unbounded memory growth (bsc#1146099).
- CVE-2019-9513: Fixed HTTP/2 implementation that is vulnerable to resource loops, potentially leading to a denial of service. (bsc#1146094).
- CVE-2019-9514: Fixed HTTP/2 implementation that is vulnerable to a reset flood, potentially leading to a denial of service (bsc#1146095).
- CVE-2019-9515: Fixed HTTP/2 flood using SETTINGS frames results in unbounded memory growth (bsc#1146100).
- CVE-2019-9516: Fixed HTTP/2 implementation that is vulnerable to a header leak, potentially leading to a denial of service (bsc#1146090).
- CVE-2019-9517: Fixed HTTP/2 implementations that are vulnerable to unconstrained interal data buffering (bsc#1146097).
- CVE-2019-9518: Fixed HTTP/2 implementation that is vulnerable to a flood of empty frames, potentially leading to a denial of service (bsc#1146093).
Patchnames
SUSE-2019-2259,SUSE-SLE-Module-Web-Scripting-15-2019-2259,SUSE-SLE-Module-Web-Scripting-15-SP1-2019-2259
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for nodejs10", "title": "Title of the patch" }, { "category": "description", "text": "This update for nodejs10 to version 10.16.3 fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2019-9511: Fixed HTTP/2 implementations that are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service (bsc#1146091).\n- CVE-2019-9512: Fixed HTTP/2 flood using PING frames results in unbounded memory growth (bsc#1146099).\n- CVE-2019-9513: Fixed HTTP/2 implementation that is vulnerable to resource loops, potentially leading to a denial of service. (bsc#1146094).\n- CVE-2019-9514: Fixed HTTP/2 implementation that is vulnerable to a reset flood, potentially leading to a denial of service (bsc#1146095).\n- CVE-2019-9515: Fixed HTTP/2 flood using SETTINGS frames results in unbounded memory growth (bsc#1146100).\n- CVE-2019-9516: Fixed HTTP/2 implementation that is vulnerable to a header leak, potentially leading to a denial of service (bsc#1146090).\n- CVE-2019-9517: Fixed HTTP/2 implementations that are vulnerable to unconstrained interal data buffering (bsc#1146097).\n- CVE-2019-9518: Fixed HTTP/2 implementation that is vulnerable to a flood of empty frames, potentially leading to a denial of service (bsc#1146093).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2019-2259,SUSE-SLE-Module-Web-Scripting-15-2019-2259,SUSE-SLE-Module-Web-Scripting-15-SP1-2019-2259", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_2259-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:2259-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192259-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:2259-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2019-September/005863.html" }, { "category": "self", "summary": "SUSE Bug 1146090", "url": "https://bugzilla.suse.com/1146090" }, { "category": "self", "summary": "SUSE Bug 1146091", "url": "https://bugzilla.suse.com/1146091" }, { "category": "self", "summary": "SUSE Bug 1146093", "url": "https://bugzilla.suse.com/1146093" }, { "category": "self", "summary": "SUSE Bug 1146094", "url": "https://bugzilla.suse.com/1146094" }, { "category": "self", "summary": "SUSE Bug 1146095", "url": "https://bugzilla.suse.com/1146095" }, { "category": "self", "summary": "SUSE Bug 1146097", "url": "https://bugzilla.suse.com/1146097" }, { "category": "self", "summary": "SUSE Bug 1146099", "url": "https://bugzilla.suse.com/1146099" }, { "category": "self", "summary": "SUSE Bug 1146100", "url": "https://bugzilla.suse.com/1146100" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9511 page", "url": "https://www.suse.com/security/cve/CVE-2019-9511/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9512 page", "url": "https://www.suse.com/security/cve/CVE-2019-9512/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9513 page", "url": "https://www.suse.com/security/cve/CVE-2019-9513/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9514 page", "url": "https://www.suse.com/security/cve/CVE-2019-9514/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9515 page", "url": "https://www.suse.com/security/cve/CVE-2019-9515/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9516 page", "url": "https://www.suse.com/security/cve/CVE-2019-9516/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9517 page", "url": "https://www.suse.com/security/cve/CVE-2019-9517/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9518 page", "url": "https://www.suse.com/security/cve/CVE-2019-9518/" } ], "title": "Security update for nodejs10", "tracking": { "current_release_date": "2019-09-02T07:04:04Z", "generator": { "date": "2019-09-02T07:04:04Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:2259-1", "initial_release_date": "2019-09-02T07:04:04Z", "revision_history": [ { "date": "2019-09-02T07:04:04Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "nodejs10-10.16.3-1.12.1.aarch64", "product": { "name": "nodejs10-10.16.3-1.12.1.aarch64", "product_id": "nodejs10-10.16.3-1.12.1.aarch64" } }, { "category": "product_version", "name": "nodejs10-devel-10.16.3-1.12.1.aarch64", "product": { "name": "nodejs10-devel-10.16.3-1.12.1.aarch64", "product_id": "nodejs10-devel-10.16.3-1.12.1.aarch64" } }, { "category": "product_version", "name": "npm10-10.16.3-1.12.1.aarch64", "product": { "name": "npm10-10.16.3-1.12.1.aarch64", "product_id": "npm10-10.16.3-1.12.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "nodejs10-10.16.3-1.12.1.i586", "product": { "name": "nodejs10-10.16.3-1.12.1.i586", "product_id": "nodejs10-10.16.3-1.12.1.i586" } }, { "category": "product_version", "name": "nodejs10-devel-10.16.3-1.12.1.i586", "product": { "name": "nodejs10-devel-10.16.3-1.12.1.i586", "product_id": "nodejs10-devel-10.16.3-1.12.1.i586" } }, { "category": "product_version", "name": "npm10-10.16.3-1.12.1.i586", "product": { "name": "npm10-10.16.3-1.12.1.i586", "product_id": "npm10-10.16.3-1.12.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "nodejs10-docs-10.16.3-1.12.1.noarch", "product": { "name": "nodejs10-docs-10.16.3-1.12.1.noarch", "product_id": "nodejs10-docs-10.16.3-1.12.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "nodejs10-10.16.3-1.12.1.ppc64le", "product": { "name": "nodejs10-10.16.3-1.12.1.ppc64le", "product_id": "nodejs10-10.16.3-1.12.1.ppc64le" } }, { "category": "product_version", "name": "nodejs10-devel-10.16.3-1.12.1.ppc64le", "product": { "name": "nodejs10-devel-10.16.3-1.12.1.ppc64le", "product_id": "nodejs10-devel-10.16.3-1.12.1.ppc64le" } }, { "category": "product_version", "name": "npm10-10.16.3-1.12.1.ppc64le", "product": { "name": "npm10-10.16.3-1.12.1.ppc64le", "product_id": "npm10-10.16.3-1.12.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "nodejs10-10.16.3-1.12.1.s390x", "product": { "name": "nodejs10-10.16.3-1.12.1.s390x", "product_id": "nodejs10-10.16.3-1.12.1.s390x" } }, { "category": "product_version", "name": "nodejs10-devel-10.16.3-1.12.1.s390x", "product": { "name": "nodejs10-devel-10.16.3-1.12.1.s390x", "product_id": "nodejs10-devel-10.16.3-1.12.1.s390x" } }, { "category": "product_version", "name": "npm10-10.16.3-1.12.1.s390x", "product": { "name": "npm10-10.16.3-1.12.1.s390x", "product_id": "npm10-10.16.3-1.12.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "nodejs10-10.16.3-1.12.1.x86_64", "product": { "name": "nodejs10-10.16.3-1.12.1.x86_64", "product_id": "nodejs10-10.16.3-1.12.1.x86_64" } }, { "category": "product_version", "name": "nodejs10-devel-10.16.3-1.12.1.x86_64", "product": { "name": "nodejs10-devel-10.16.3-1.12.1.x86_64", "product_id": "nodejs10-devel-10.16.3-1.12.1.x86_64" } }, { "category": "product_version", "name": "npm10-10.16.3-1.12.1.x86_64", "product": { "name": "npm10-10.16.3-1.12.1.x86_64", "product_id": "npm10-10.16.3-1.12.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Web and Scripting 15", "product": { "name": "SUSE Linux Enterprise Module for Web and Scripting 15", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-web-scripting:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product": { "name": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-web-scripting:15:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.16.3-1.12.1.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 15", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.aarch64" }, "product_reference": "nodejs10-10.16.3-1.12.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.16.3-1.12.1.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 15", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.ppc64le" }, "product_reference": "nodejs10-10.16.3-1.12.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.16.3-1.12.1.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 15", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.s390x" }, "product_reference": "nodejs10-10.16.3-1.12.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.16.3-1.12.1.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 15", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.x86_64" }, "product_reference": "nodejs10-10.16.3-1.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.16.3-1.12.1.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 15", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.aarch64" }, "product_reference": "nodejs10-devel-10.16.3-1.12.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.16.3-1.12.1.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 15", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.ppc64le" }, "product_reference": "nodejs10-devel-10.16.3-1.12.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.16.3-1.12.1.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 15", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.s390x" }, "product_reference": "nodejs10-devel-10.16.3-1.12.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.16.3-1.12.1.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 15", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.x86_64" }, "product_reference": "nodejs10-devel-10.16.3-1.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-docs-10.16.3-1.12.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-docs-10.16.3-1.12.1.noarch" }, "product_reference": "nodejs10-docs-10.16.3-1.12.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.16.3-1.12.1.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 15", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.aarch64" }, "product_reference": "npm10-10.16.3-1.12.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.16.3-1.12.1.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 15", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.ppc64le" }, "product_reference": "npm10-10.16.3-1.12.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.16.3-1.12.1.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 15", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.s390x" }, "product_reference": "npm10-10.16.3-1.12.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.16.3-1.12.1.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 15", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.x86_64" }, "product_reference": "npm10-10.16.3-1.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.16.3-1.12.1.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.aarch64" }, "product_reference": "nodejs10-10.16.3-1.12.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.16.3-1.12.1.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.ppc64le" }, "product_reference": "nodejs10-10.16.3-1.12.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.16.3-1.12.1.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.s390x" }, "product_reference": "nodejs10-10.16.3-1.12.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.16.3-1.12.1.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.x86_64" }, "product_reference": "nodejs10-10.16.3-1.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.16.3-1.12.1.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.aarch64" }, "product_reference": "nodejs10-devel-10.16.3-1.12.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.16.3-1.12.1.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.ppc64le" }, "product_reference": "nodejs10-devel-10.16.3-1.12.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.16.3-1.12.1.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.s390x" }, "product_reference": "nodejs10-devel-10.16.3-1.12.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.16.3-1.12.1.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.x86_64" }, "product_reference": "nodejs10-devel-10.16.3-1.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-docs-10.16.3-1.12.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-docs-10.16.3-1.12.1.noarch" }, "product_reference": "nodejs10-docs-10.16.3-1.12.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.16.3-1.12.1.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.aarch64" }, "product_reference": "npm10-10.16.3-1.12.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.16.3-1.12.1.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.ppc64le" }, "product_reference": "npm10-10.16.3-1.12.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.16.3-1.12.1.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.s390x" }, "product_reference": "npm10-10.16.3-1.12.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.16.3-1.12.1.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.x86_64" }, "product_reference": "npm10-10.16.3-1.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-9511", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9511" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9511", "url": "https://www.suse.com/security/cve/CVE-2019-9511" }, { "category": "external", "summary": "SUSE Bug 1145579 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1145579" }, { "category": "external", "summary": "SUSE Bug 1146091 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1146091" }, { "category": "external", "summary": "SUSE Bug 1146182 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1146182" }, { "category": "external", "summary": "SUSE Bug 1193427 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1193427" }, { "category": "external", "summary": "SUSE Bug 1202787 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1202787" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-02T07:04:04Z", "details": "low" } ], "title": "CVE-2019-9511" }, { "cve": "CVE-2019-9512", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9512" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9512", "url": "https://www.suse.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146099 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1146099" }, { "category": "external", "summary": "SUSE Bug 1146111 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1146111" }, { "category": "external", "summary": "SUSE Bug 1147142 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1147142" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-02T07:04:04Z", "details": "important" } ], "title": "CVE-2019-9512" }, { "cve": "CVE-2019-9513", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9513" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9513", "url": "https://www.suse.com/security/cve/CVE-2019-9513" }, { "category": "external", "summary": "SUSE Bug 1145580 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1145580" }, { "category": "external", "summary": "SUSE Bug 1146094 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1146094" }, { "category": "external", "summary": "SUSE Bug 1146184 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1146184" }, { "category": "external", "summary": "SUSE Bug 1193427 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1193427" }, { "category": "external", "summary": "SUSE Bug 1202787 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1202787" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-02T07:04:04Z", "details": "low" } ], "title": "CVE-2019-9513" }, { "cve": "CVE-2019-9514", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9514" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9514", "url": "https://www.suse.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "SUSE Bug 1145662 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1145662" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146095 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1146095" }, { "category": "external", "summary": "SUSE Bug 1146115 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1146115" }, { "category": "external", "summary": "SUSE Bug 1147142 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1147142" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-02T07:04:04Z", "details": "important" } ], "title": "CVE-2019-9514" }, { "cve": "CVE-2019-9515", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9515" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to a settings flood, potentially leading to a denial of service. The attacker sends a stream of SETTINGS frames to the peer. Since the RFC requires that the peer reply with one acknowledgement per SETTINGS frame, an empty SETTINGS frame is almost equivalent in behavior to a ping. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9515", "url": "https://www.suse.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9515", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146100 for CVE-2019-9515", "url": "https://bugzilla.suse.com/1146100" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-02T07:04:04Z", "details": "important" } ], "title": "CVE-2019-9515" }, { "cve": "CVE-2019-9516", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9516" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service. The attacker sends a stream of headers with a 0-length header name and 0-length header value, optionally Huffman encoded into 1-byte or greater headers. Some implementations allocate memory for these headers and keep the allocation alive until the session dies. This can consume excess memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9516", "url": "https://www.suse.com/security/cve/CVE-2019-9516" }, { "category": "external", "summary": "SUSE Bug 1145582 for CVE-2019-9516", "url": "https://bugzilla.suse.com/1145582" }, { "category": "external", "summary": "SUSE Bug 1146090 for CVE-2019-9516", "url": "https://bugzilla.suse.com/1146090" }, { "category": "external", "summary": "SUSE Bug 1193427 for CVE-2019-9516", "url": "https://bugzilla.suse.com/1193427" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-02T07:04:04Z", "details": "low" } ], "title": "CVE-2019-9516" }, { "cve": "CVE-2019-9517", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9517" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to unconstrained interal data buffering, potentially leading to a denial of service. The attacker opens the HTTP/2 window so the peer can send without constraint; however, they leave the TCP window closed so the peer cannot actually write (many of) the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the servers queue the responses, this can consume excess memory, CPU, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9517", "url": "https://www.suse.com/security/cve/CVE-2019-9517" }, { "category": "external", "summary": "SUSE Bug 1145575 for CVE-2019-9517", "url": "https://bugzilla.suse.com/1145575" }, { "category": "external", "summary": "SUSE Bug 1146097 for CVE-2019-9517", "url": "https://bugzilla.suse.com/1146097" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-02T07:04:04Z", "details": "moderate" } ], "title": "CVE-2019-9517" }, { "cve": "CVE-2019-9518", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9518" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leading to a denial of service. The attacker sends a stream of frames with an empty payload and without the end-of-stream flag. These frames can be DATA, HEADERS, CONTINUATION and/or PUSH_PROMISE. The peer spends time processing each frame disproportionate to attack bandwidth. This can consume excess CPU.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9518", "url": "https://www.suse.com/security/cve/CVE-2019-9518" }, { "category": "external", "summary": "SUSE Bug 1145662 for CVE-2019-9518", "url": "https://bugzilla.suse.com/1145662" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9518", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146093 for CVE-2019-9518", "url": "https://bugzilla.suse.com/1146093" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-02T07:04:04Z", "details": "important" } ], "title": "CVE-2019-9518" } ] }
suse-su-2019:2260-1
Vulnerability from csaf_suse
Published
2019-09-02 07:04
Modified
2019-09-02 07:04
Summary
Security update for nodejs8
Notes
Title of the patch
Security update for nodejs8
Description of the patch
This update for nodejs8 to version 8.16.1 fixes the following issues:
Security issues fixed:
- CVE-2019-9511: Fixed HTTP/2 implementations that are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service (bsc#1146091).
- CVE-2019-9512: Fixed HTTP/2 flood using PING frames results in unbounded memory growth (bsc#1146099).
- CVE-2019-9513: Fixed HTTP/2 implementation that is vulnerable to resource loops, potentially leading to a denial of service. (bsc#1146094).
- CVE-2019-9514: Fixed HTTP/2 implementation that is vulnerable to a reset flood, potentially leading to a denial of service (bsc#1146095).
- CVE-2019-9515: Fixed HTTP/2 flood using SETTINGS frames results in unbounded memory growth (bsc#1146100).
- CVE-2019-9516: Fixed HTTP/2 implementation that is vulnerable to a header leak, potentially leading to a denial of service (bsc#1146090).
- CVE-2019-9517: Fixed HTTP/2 implementations that are vulnerable to unconstrained interal data buffering (bsc#1146097).
- CVE-2019-9518: Fixed HTTP/2 implementation that is vulnerable to a flood of empty frames, potentially leading to a denial of service (bsc#1146093).
Bug fixes:
- Fixed that npm resolves its default config file like in all other versions, as /etc/nodejs/npmrc (bsc#1144919).
Patchnames
SUSE-2019-2260,SUSE-SLE-Module-Web-Scripting-15-2019-2260,SUSE-SLE-Module-Web-Scripting-15-SP1-2019-2260
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for nodejs8", "title": "Title of the patch" }, { "category": "description", "text": "This update for nodejs8 to version 8.16.1 fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2019-9511: Fixed HTTP/2 implementations that are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service (bsc#1146091).\n- CVE-2019-9512: Fixed HTTP/2 flood using PING frames results in unbounded memory growth (bsc#1146099).\n- CVE-2019-9513: Fixed HTTP/2 implementation that is vulnerable to resource loops, potentially leading to a denial of service. (bsc#1146094).\n- CVE-2019-9514: Fixed HTTP/2 implementation that is vulnerable to a reset flood, potentially leading to a denial of service (bsc#1146095).\n- CVE-2019-9515: Fixed HTTP/2 flood using SETTINGS frames results in unbounded memory growth (bsc#1146100).\n- CVE-2019-9516: Fixed HTTP/2 implementation that is vulnerable to a header leak, potentially leading to a denial of service (bsc#1146090).\n- CVE-2019-9517: Fixed HTTP/2 implementations that are vulnerable to unconstrained interal data buffering (bsc#1146097).\n- CVE-2019-9518: Fixed HTTP/2 implementation that is vulnerable to a flood of empty frames, potentially leading to a denial of service (bsc#1146093).\n\nBug fixes:\n\n- Fixed that npm resolves its default config file like in all other versions, as /etc/nodejs/npmrc (bsc#1144919).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2019-2260,SUSE-SLE-Module-Web-Scripting-15-2019-2260,SUSE-SLE-Module-Web-Scripting-15-SP1-2019-2260", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_2260-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:2260-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192260-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:2260-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2019-September/005862.html" }, { "category": "self", "summary": "SUSE Bug 1144919", "url": "https://bugzilla.suse.com/1144919" }, { "category": "self", "summary": "SUSE Bug 1146090", "url": "https://bugzilla.suse.com/1146090" }, { "category": "self", "summary": "SUSE Bug 1146091", "url": "https://bugzilla.suse.com/1146091" }, { "category": "self", "summary": "SUSE Bug 1146093", "url": "https://bugzilla.suse.com/1146093" }, { "category": "self", "summary": "SUSE Bug 1146094", "url": "https://bugzilla.suse.com/1146094" }, { "category": "self", "summary": "SUSE Bug 1146095", "url": "https://bugzilla.suse.com/1146095" }, { "category": "self", "summary": "SUSE Bug 1146097", "url": "https://bugzilla.suse.com/1146097" }, { "category": "self", "summary": "SUSE Bug 1146099", "url": "https://bugzilla.suse.com/1146099" }, { "category": "self", "summary": "SUSE Bug 1146100", "url": "https://bugzilla.suse.com/1146100" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9511 page", "url": "https://www.suse.com/security/cve/CVE-2019-9511/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9512 page", "url": "https://www.suse.com/security/cve/CVE-2019-9512/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9513 page", "url": "https://www.suse.com/security/cve/CVE-2019-9513/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9514 page", "url": "https://www.suse.com/security/cve/CVE-2019-9514/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9515 page", "url": "https://www.suse.com/security/cve/CVE-2019-9515/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9516 page", "url": "https://www.suse.com/security/cve/CVE-2019-9516/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9517 page", "url": "https://www.suse.com/security/cve/CVE-2019-9517/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9518 page", "url": "https://www.suse.com/security/cve/CVE-2019-9518/" } ], "title": "Security update for nodejs8", "tracking": { "current_release_date": "2019-09-02T07:04:20Z", "generator": { "date": "2019-09-02T07:04:20Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:2260-1", "initial_release_date": "2019-09-02T07:04:20Z", "revision_history": [ { "date": "2019-09-02T07:04:20Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "nodejs8-8.16.1-3.20.1.aarch64", "product": { "name": "nodejs8-8.16.1-3.20.1.aarch64", "product_id": "nodejs8-8.16.1-3.20.1.aarch64" } }, { "category": "product_version", "name": "nodejs8-devel-8.16.1-3.20.1.aarch64", "product": { "name": "nodejs8-devel-8.16.1-3.20.1.aarch64", "product_id": "nodejs8-devel-8.16.1-3.20.1.aarch64" } }, { "category": "product_version", "name": "npm8-8.16.1-3.20.1.aarch64", "product": { "name": "npm8-8.16.1-3.20.1.aarch64", "product_id": "npm8-8.16.1-3.20.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "nodejs8-8.16.1-3.20.1.i586", "product": { "name": "nodejs8-8.16.1-3.20.1.i586", "product_id": "nodejs8-8.16.1-3.20.1.i586" } }, { "category": "product_version", "name": "nodejs8-devel-8.16.1-3.20.1.i586", "product": { "name": "nodejs8-devel-8.16.1-3.20.1.i586", "product_id": "nodejs8-devel-8.16.1-3.20.1.i586" } }, { "category": "product_version", "name": "npm8-8.16.1-3.20.1.i586", "product": { "name": "npm8-8.16.1-3.20.1.i586", "product_id": "npm8-8.16.1-3.20.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "nodejs8-docs-8.16.1-3.20.1.noarch", "product": { "name": "nodejs8-docs-8.16.1-3.20.1.noarch", "product_id": "nodejs8-docs-8.16.1-3.20.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "nodejs8-8.16.1-3.20.1.ppc64le", "product": { "name": "nodejs8-8.16.1-3.20.1.ppc64le", "product_id": "nodejs8-8.16.1-3.20.1.ppc64le" } }, { "category": "product_version", "name": "nodejs8-devel-8.16.1-3.20.1.ppc64le", "product": { "name": "nodejs8-devel-8.16.1-3.20.1.ppc64le", "product_id": "nodejs8-devel-8.16.1-3.20.1.ppc64le" } }, { "category": "product_version", "name": "npm8-8.16.1-3.20.1.ppc64le", "product": { "name": "npm8-8.16.1-3.20.1.ppc64le", "product_id": "npm8-8.16.1-3.20.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "nodejs8-8.16.1-3.20.1.s390x", "product": { "name": "nodejs8-8.16.1-3.20.1.s390x", "product_id": "nodejs8-8.16.1-3.20.1.s390x" } }, { "category": "product_version", "name": "nodejs8-devel-8.16.1-3.20.1.s390x", "product": { "name": "nodejs8-devel-8.16.1-3.20.1.s390x", "product_id": "nodejs8-devel-8.16.1-3.20.1.s390x" } }, { "category": "product_version", "name": "npm8-8.16.1-3.20.1.s390x", "product": { "name": "npm8-8.16.1-3.20.1.s390x", "product_id": "npm8-8.16.1-3.20.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "nodejs8-8.16.1-3.20.1.x86_64", "product": { "name": "nodejs8-8.16.1-3.20.1.x86_64", "product_id": "nodejs8-8.16.1-3.20.1.x86_64" } }, { "category": "product_version", "name": "nodejs8-devel-8.16.1-3.20.1.x86_64", "product": { "name": "nodejs8-devel-8.16.1-3.20.1.x86_64", "product_id": "nodejs8-devel-8.16.1-3.20.1.x86_64" } }, { "category": "product_version", "name": "npm8-8.16.1-3.20.1.x86_64", "product": { "name": "npm8-8.16.1-3.20.1.x86_64", "product_id": "npm8-8.16.1-3.20.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Web and Scripting 15", "product": { "name": "SUSE Linux Enterprise Module for Web and Scripting 15", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-web-scripting:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product": { "name": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-web-scripting:15:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "nodejs8-8.16.1-3.20.1.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 15", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.aarch64" }, "product_reference": "nodejs8-8.16.1-3.20.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-8.16.1-3.20.1.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 15", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.ppc64le" }, "product_reference": "nodejs8-8.16.1-3.20.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-8.16.1-3.20.1.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 15", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.s390x" }, "product_reference": "nodejs8-8.16.1-3.20.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-8.16.1-3.20.1.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 15", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.x86_64" }, "product_reference": "nodejs8-8.16.1-3.20.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-devel-8.16.1-3.20.1.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 15", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.aarch64" }, "product_reference": "nodejs8-devel-8.16.1-3.20.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-devel-8.16.1-3.20.1.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 15", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.ppc64le" }, "product_reference": "nodejs8-devel-8.16.1-3.20.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-devel-8.16.1-3.20.1.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 15", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.s390x" }, "product_reference": "nodejs8-devel-8.16.1-3.20.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-devel-8.16.1-3.20.1.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 15", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.x86_64" }, "product_reference": "nodejs8-devel-8.16.1-3.20.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-docs-8.16.1-3.20.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-docs-8.16.1-3.20.1.noarch" }, "product_reference": "nodejs8-docs-8.16.1-3.20.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15" }, { "category": "default_component_of", "full_product_name": { "name": "npm8-8.16.1-3.20.1.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 15", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.aarch64" }, "product_reference": "npm8-8.16.1-3.20.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15" }, { "category": "default_component_of", "full_product_name": { "name": "npm8-8.16.1-3.20.1.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 15", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.ppc64le" }, "product_reference": "npm8-8.16.1-3.20.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15" }, { "category": "default_component_of", "full_product_name": { "name": "npm8-8.16.1-3.20.1.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 15", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.s390x" }, "product_reference": "npm8-8.16.1-3.20.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15" }, { "category": "default_component_of", "full_product_name": { "name": "npm8-8.16.1-3.20.1.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 15", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.x86_64" }, "product_reference": "npm8-8.16.1-3.20.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-8.16.1-3.20.1.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.aarch64" }, "product_reference": "nodejs8-8.16.1-3.20.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-8.16.1-3.20.1.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.ppc64le" }, "product_reference": "nodejs8-8.16.1-3.20.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-8.16.1-3.20.1.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.s390x" }, "product_reference": "nodejs8-8.16.1-3.20.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-8.16.1-3.20.1.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.x86_64" }, "product_reference": "nodejs8-8.16.1-3.20.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-devel-8.16.1-3.20.1.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.aarch64" }, "product_reference": "nodejs8-devel-8.16.1-3.20.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-devel-8.16.1-3.20.1.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.ppc64le" }, "product_reference": "nodejs8-devel-8.16.1-3.20.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-devel-8.16.1-3.20.1.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.s390x" }, "product_reference": "nodejs8-devel-8.16.1-3.20.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-devel-8.16.1-3.20.1.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.x86_64" }, "product_reference": "nodejs8-devel-8.16.1-3.20.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-docs-8.16.1-3.20.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-docs-8.16.1-3.20.1.noarch" }, "product_reference": "nodejs8-docs-8.16.1-3.20.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "npm8-8.16.1-3.20.1.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.aarch64" }, "product_reference": "npm8-8.16.1-3.20.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "npm8-8.16.1-3.20.1.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.ppc64le" }, "product_reference": "npm8-8.16.1-3.20.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "npm8-8.16.1-3.20.1.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.s390x" }, "product_reference": "npm8-8.16.1-3.20.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "npm8-8.16.1-3.20.1.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.x86_64" }, "product_reference": "npm8-8.16.1-3.20.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-9511", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9511" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9511", "url": "https://www.suse.com/security/cve/CVE-2019-9511" }, { "category": "external", "summary": "SUSE Bug 1145579 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1145579" }, { "category": "external", "summary": "SUSE Bug 1146091 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1146091" }, { "category": "external", "summary": "SUSE Bug 1146182 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1146182" }, { "category": "external", "summary": "SUSE Bug 1193427 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1193427" }, { "category": "external", "summary": "SUSE Bug 1202787 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1202787" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-02T07:04:20Z", "details": "low" } ], "title": "CVE-2019-9511" }, { "cve": "CVE-2019-9512", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9512" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9512", "url": "https://www.suse.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146099 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1146099" }, { "category": "external", "summary": "SUSE Bug 1146111 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1146111" }, { "category": "external", "summary": "SUSE Bug 1147142 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1147142" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-02T07:04:20Z", "details": "important" } ], "title": "CVE-2019-9512" }, { "cve": "CVE-2019-9513", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9513" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9513", "url": "https://www.suse.com/security/cve/CVE-2019-9513" }, { "category": "external", "summary": "SUSE Bug 1145580 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1145580" }, { "category": "external", "summary": "SUSE Bug 1146094 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1146094" }, { "category": "external", "summary": "SUSE Bug 1146184 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1146184" }, { "category": "external", "summary": "SUSE Bug 1193427 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1193427" }, { "category": "external", "summary": "SUSE Bug 1202787 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1202787" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-02T07:04:20Z", "details": "low" } ], "title": "CVE-2019-9513" }, { "cve": "CVE-2019-9514", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9514" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9514", "url": "https://www.suse.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "SUSE Bug 1145662 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1145662" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146095 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1146095" }, { "category": "external", "summary": "SUSE Bug 1146115 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1146115" }, { "category": "external", "summary": "SUSE Bug 1147142 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1147142" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-02T07:04:20Z", "details": "important" } ], "title": "CVE-2019-9514" }, { "cve": "CVE-2019-9515", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9515" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to a settings flood, potentially leading to a denial of service. The attacker sends a stream of SETTINGS frames to the peer. Since the RFC requires that the peer reply with one acknowledgement per SETTINGS frame, an empty SETTINGS frame is almost equivalent in behavior to a ping. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9515", "url": "https://www.suse.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9515", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146100 for CVE-2019-9515", "url": "https://bugzilla.suse.com/1146100" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-02T07:04:20Z", "details": "important" } ], "title": "CVE-2019-9515" }, { "cve": "CVE-2019-9516", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9516" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service. The attacker sends a stream of headers with a 0-length header name and 0-length header value, optionally Huffman encoded into 1-byte or greater headers. Some implementations allocate memory for these headers and keep the allocation alive until the session dies. This can consume excess memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9516", "url": "https://www.suse.com/security/cve/CVE-2019-9516" }, { "category": "external", "summary": "SUSE Bug 1145582 for CVE-2019-9516", "url": "https://bugzilla.suse.com/1145582" }, { "category": "external", "summary": "SUSE Bug 1146090 for CVE-2019-9516", "url": "https://bugzilla.suse.com/1146090" }, { "category": "external", "summary": "SUSE Bug 1193427 for CVE-2019-9516", "url": "https://bugzilla.suse.com/1193427" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-02T07:04:20Z", "details": "low" } ], "title": "CVE-2019-9516" }, { "cve": "CVE-2019-9517", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9517" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to unconstrained interal data buffering, potentially leading to a denial of service. The attacker opens the HTTP/2 window so the peer can send without constraint; however, they leave the TCP window closed so the peer cannot actually write (many of) the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the servers queue the responses, this can consume excess memory, CPU, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9517", "url": "https://www.suse.com/security/cve/CVE-2019-9517" }, { "category": "external", "summary": "SUSE Bug 1145575 for CVE-2019-9517", "url": "https://bugzilla.suse.com/1145575" }, { "category": "external", "summary": "SUSE Bug 1146097 for CVE-2019-9517", "url": "https://bugzilla.suse.com/1146097" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-02T07:04:20Z", "details": "moderate" } ], "title": "CVE-2019-9517" }, { "cve": "CVE-2019-9518", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9518" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leading to a denial of service. The attacker sends a stream of frames with an empty payload and without the end-of-stream flag. These frames can be DATA, HEADERS, CONTINUATION and/or PUSH_PROMISE. The peer spends time processing each frame disproportionate to attack bandwidth. This can consume excess CPU.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9518", "url": "https://www.suse.com/security/cve/CVE-2019-9518" }, { "category": "external", "summary": "SUSE Bug 1145662 for CVE-2019-9518", "url": "https://bugzilla.suse.com/1145662" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9518", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146093 for CVE-2019-9518", "url": "https://bugzilla.suse.com/1146093" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-02T07:04:20Z", "details": "important" } ], "title": "CVE-2019-9518" } ] }
rhsa-2020:1445
Vulnerability from csaf_redhat
Published
2020-04-14 13:04
Modified
2025-08-07 09:56
Summary
Red Hat Security Advisory: Red Hat AMQ Broker 7.4.3 release and security update
Notes
Topic
Red Hat AMQ Broker 7.4.3 is now available from the Red Hat Customer Portal.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
AMQ Broker is a high-performance messaging implementation based on ActiveMQ Artemis. It uses an asynchronous journal for fast message persistence, and supports multiple languages, protocols, and platforms.
This release of Red Hat AMQ Broker 7.4.3 serves as a replacement for Red Hat AMQ Broker 7.4.2, and includes security and bug fixes, and enhancements. For further information, refer to the release notes linked to in the References section.
Security Fix(es):
* jetty: HTTP/2: large amount of data requests leads to denial of service (CVE-2019-9511)
* jetty: HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)
* jetty: HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)
* jetty: HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)
* jetty: HTTP/2: 0-length headers lead to denial of service (CVE-2019-9516)
* jetty: HTTP/2: request for large response leads to denial of service (CVE-2019-9517)
* jetty: HTTP/2: flood using empty frames results in excessive resource consumption (CVE-2019-9518)
* netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers (CVE-2019-16869)
* netty: HTTP request smuggling (CVE-2019-20444)
* netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header (CVE-2019-20445)
* netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling (CVE-2020-7238)
* mqtt-client: activemq: Corrupt MQTT frame can cause broker shutdown (CVE-2019-0222)
* jetty: using specially formatted URL against DefaultServlet or ResourceHandler leads to XSS conditions (CVE-2019-10241)
* jetty: error path information disclosure (CVE-2019-10247)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat AMQ Broker 7.4.3 is now available from the Red Hat Customer Portal.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "AMQ Broker is a high-performance messaging implementation based on ActiveMQ Artemis. It uses an asynchronous journal for fast message persistence, and supports multiple languages, protocols, and platforms. \n\nThis release of Red Hat AMQ Broker 7.4.3 serves as a replacement for Red Hat AMQ Broker 7.4.2, and includes security and bug fixes, and enhancements. For further information, refer to the release notes linked to in the References section.\n\nSecurity Fix(es):\n\n* jetty: HTTP/2: large amount of data requests leads to denial of service (CVE-2019-9511)\n\n* jetty: HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* jetty: HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* jetty: HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\n* jetty: HTTP/2: 0-length headers lead to denial of service (CVE-2019-9516)\n\n* jetty: HTTP/2: request for large response leads to denial of service (CVE-2019-9517)\n\n* jetty: HTTP/2: flood using empty frames results in excessive resource consumption (CVE-2019-9518)\n\n* netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers (CVE-2019-16869)\n\n* netty: HTTP request smuggling (CVE-2019-20444)\n\n* netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header (CVE-2019-20445)\n\n* netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling (CVE-2020-7238)\n\n* mqtt-client: activemq: Corrupt MQTT frame can cause broker shutdown (CVE-2019-0222)\n\n* jetty: using specially formatted URL against DefaultServlet or ResourceHandler leads to XSS conditions (CVE-2019-10241)\n\n* jetty: error path information disclosure (CVE-2019-10247)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:1445", "url": "https://access.redhat.com/errata/RHSA-2020:1445" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=jboss.amq.broker\u0026version=7.4.3", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=jboss.amq.broker\u0026version=7.4.3" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_amq/7.4/", "url": "https://access.redhat.com/documentation/en-us/red_hat_amq/7.4/" }, { "category": "external", "summary": "1696012", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1696012" }, { "category": "external", "summary": "1705924", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1705924" }, { "category": "external", "summary": "1705993", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1705993" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "1741864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741864" }, { "category": "external", "summary": "1741868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741868" }, { "category": "external", "summary": "1758619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758619" }, { "category": "external", "summary": "1796225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796225" }, { "category": "external", "summary": "1798509", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798509" }, { "category": "external", "summary": "1798524", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798524" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_1445.json" } ], "title": "Red Hat Security Advisory: Red Hat AMQ Broker 7.4.3 release and security update", "tracking": { "current_release_date": "2025-08-07T09:56:53+00:00", "generator": { "date": "2025-08-07T09:56:53+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2020:1445", "initial_release_date": "2020-04-14T13:04:37+00:00", "revision_history": [ { "date": "2020-04-14T13:04:37+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-04-14T13:04:37+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-07T09:56:53+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat AMQ 7.4.3", "product": { "name": "Red Hat AMQ 7.4.3", "product_id": "Red Hat AMQ 7.4.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:amq_broker:7" } } } ], "category": "product_family", "name": "Red Hat JBoss AMQ" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-0222", "discovery_date": "2019-03-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1696012" } ], "notes": [ { "category": "description", "text": "In Apache ActiveMQ 5.0.0 - 5.15.8, unmarshalling corrupt MQTT frame can lead to broker Out of Memory exception making it unresponsive.", "title": "Vulnerability description" }, { "category": "summary", "text": "activemq: Corrupt MQTT frame can cause broker shutdown", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ 7.4.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-0222" }, { "category": "external", "summary": "RHBZ#1696012", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1696012" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-0222", "url": "https://www.cve.org/CVERecord?id=CVE-2019-0222" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0222", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0222" } ], "release_date": "2019-03-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-14T13:04:37+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ 7.4.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1445" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ 7.4.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "activemq: Corrupt MQTT frame can cause broker shutdown" }, { "cve": "CVE-2019-9511", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741860" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker can request a large amount of data by manipulating window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this queue can consume excess CPU, memory, or both, leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: large amount of data requests leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "There are no mitigations available for nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ 7.4.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9511" }, { "category": "external", "summary": "RHBZ#1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9511", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9511" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-14T13:04:37+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ 7.4.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1445" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "Red Hat AMQ 7.4.3" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ 7.4.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTP/2: large amount of data requests leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ 7.4.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-14T13:04:37+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ 7.4.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1445" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ 7.4.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ 7.4.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-14T13:04:37+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ 7.4.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1445" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ 7.4.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ 7.4.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-14T13:04:37+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ 7.4.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1445" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ 7.4.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "cve": "CVE-2019-9516", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741864" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker, sending a stream of header with a 0-length header name and a 0-length header value, could cause some implementations to allocate memory for these headers and keep the allocations alive until the session dies. The can consume excess memory, potentially leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: 0-length headers lead to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ 7.4.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9516" }, { "category": "external", "summary": "RHBZ#1741864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741864" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9516", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9516" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9516", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9516" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://github.com/nghttp2/nghttp2/issues/1382#", "url": "https://github.com/nghttp2/nghttp2/issues/1382#" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-14T13:04:37+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ 7.4.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1445" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "Red Hat AMQ 7.4.3" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ 7.4.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTP/2: 0-length headers lead to denial of service" }, { "cve": "CVE-2019-9517", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741868" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in HTTP/2. An attacker can open a HTTP/2 window so the peer can send without constraint. The TCP window remains closed so the peer cannot write the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the server\u0027s queue is setup, the responses can consume excess memory, CPU, or both, potentially leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: request for large response leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "The package httpd versions as shipped with Red Hat Enterprise Linux 5, 6 and 7 are not affected by this issue as HTTP/2 support is not provided.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ 7.4.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9517" }, { "category": "external", "summary": "RHBZ#1741868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741868" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9517", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9517" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9517", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9517" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-14T13:04:37+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ 7.4.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1445" }, { "category": "workaround", "details": "The httpd version shipped with Red Hat Enterprise Linux 8 provides HTTP/2 support through mod_http2 package. While mod_http2 package is not updated, users can disable HTTP/2 support as mitigation action by executing the following steps:\n\n1. Stop httpd service:\n$ systemctl stop httpd\n\n2. Remove http/2 protocol support from configuration files:\n$ sed -i \u0027s/\\(h2\\)\\|\\(h2c\\)//g\u0027 \u003chttpd_config_file\u003e\n\n3. Validate configuration files to make sure all syntax is valid:\n$ apachectl configtest\n\n4. Restart httpd service:\n$ systemctl start httpd", "product_ids": [ "Red Hat AMQ 7.4.3" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ 7.4.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTP/2: request for large response leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9518", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735749" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using frames with an empty payload, a flood could occur that results in excessive CPU usage and starvation of other clients. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using empty frames results in excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ 7.4.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9518" }, { "category": "external", "summary": "RHBZ#1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9518", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9518" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-14T13:04:37+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ 7.4.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1445" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ 7.4.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTP/2: flood using empty frames results in excessive resource consumption" }, { "cve": "CVE-2019-10241", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2019-04-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1705924" } ], "notes": [ { "category": "description", "text": "In Eclipse Jetty version 9.2.26 and older, 9.3.25 and older, and 9.4.15 and older, the server is vulnerable to XSS conditions if a remote client USES a specially formatted URL against the DefaultServlet or ResourceHandler that is configured for showing a Listing of directory contents.", "title": "Vulnerability description" }, { "category": "summary", "text": "jetty: using specially formatted URL against DefaultServlet or ResourceHandler leads to XSS conditions", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of jetty which is embedded in the nutch package as shipped with Red Hat Satellite 5. The jetty server is not exposed, as such exploitation is difficult, Red Hat Product Security has rated this issue as having security impact of Low in the context of Red Hat Satellite 5. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ 7.4.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10241" }, { "category": "external", "summary": "RHBZ#1705924", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1705924" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10241", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10241" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10241", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10241" } ], "release_date": "2019-04-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-14T13:04:37+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ 7.4.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1445" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", "version": "3.0" }, "products": [ "Red Hat AMQ 7.4.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jetty: using specially formatted URL against DefaultServlet or ResourceHandler leads to XSS conditions" }, { "cve": "CVE-2019-10247", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-04-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1705993" } ], "notes": [ { "category": "description", "text": "In Eclipse Jetty version 7.x, 8.x, 9.2.27 and older, 9.3.26 and older, and 9.4.16 and older, the server running on any OS and Jetty version combination will reveal the configured fully qualified directory base resource location on the output of the 404 error for not finding a Context that matches the requested path. The default server behavior on jetty-distribution and jetty-home will include at the end of the Handler tree a DefaultHandler, which is responsible for reporting this 404 error, it presents the various configured contexts as HTML for users to click through to. This produced HTML includes output that contains the configured fully qualified directory base resource location for each context.", "title": "Vulnerability description" }, { "category": "summary", "text": "jetty: error path information disclosure", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of jetty which is embedded in the nutch package as shipped with Red Hat Satellite 5. The jetty server is not exposed, as such exploitation is difficult, Red Hat Product Security has rated this issue as having security impact of Low in the context of Red Hat Satellite 5. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ 7.4.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10247" }, { "category": "external", "summary": "RHBZ#1705993", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1705993" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10247", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10247" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10247", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10247" } ], "release_date": "2019-04-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-14T13:04:37+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ 7.4.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1445" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat AMQ 7.4.3" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "jetty: error path information disclosure" }, { "cve": "CVE-2019-16869", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2019-09-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1758619" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty, where whitespace before the colon in HTTP headers is mishandled. This flaw allows an attacker to cause HTTP request smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that this vulnerability does not poses a substantial practical threat to ElasticSearch 6 [1]. We agree that this issue would be difficult to exploit these vulnerabilities on OpenShift Container Platform, so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships vulnerable netty version embedded in Candlepin, however, is not directly vulnerable since HTTP requests are handled by Tomcat and not netty.\n\n[1] https://github.com/elastic/elasticsearch/issues/49396", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ 7.4.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-16869" }, { "category": "external", "summary": "RHBZ#1758619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758619" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16869", "url": "https://www.cve.org/CVERecord?id=CVE-2019-16869" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16869", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16869" } ], "release_date": "2019-09-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-14T13:04:37+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ 7.4.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1445" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Red Hat AMQ 7.4.3" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "Red Hat AMQ 7.4.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers" }, { "cve": "CVE-2019-20444", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2020-01-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1798524" } ], "notes": [ { "category": "description", "text": "A HTTP smuggling flaw was found in HttpObjectDecoder.java in Netty in versions prior to version 4.1.44. HTTP headers with an invalid fold, in this case CRLF (carriage return, line feed) without being followed by SP (space) or HTAB (horizontal tab), result in situations where headers can be misread. Data integrity is the highest threat with this vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HTTP request smuggling", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that the previous vulnerability, CVE-2019-16869, does not pose a substantial practical threat to ElasticSearch 6. We agree that these issues would be difficult to exploit on OpenShift Container Platform so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships a vulnerable version of netty embedded in Candlepin. However, the flaw can not be triggered in that context, because HTTP requests are handled by Tomcat, not by netty. A future release may fix this.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ 7.4.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-20444" }, { "category": "external", "summary": "RHBZ#1798524", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798524" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20444", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20444" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20444", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20444" }, { "category": "external", "summary": "https://github.com/elastic/elasticsearch/issues/49396", "url": "https://github.com/elastic/elasticsearch/issues/49396" } ], "release_date": "2020-01-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-14T13:04:37+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ 7.4.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1445" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Red Hat AMQ 7.4.3" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat AMQ 7.4.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HTTP request smuggling" }, { "cve": "CVE-2019-20445", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2020-01-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1798509" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty before version 4.1.44, where it accepted multiple Content-Length headers and also accepted both Transfer-Encoding, as well as Content-Length headers where it should reject the message under such circumstances. In circumstances where Netty is used in the context of a server, it could result in a viable HTTP smuggling vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that the previous vulnerability, CVE-2019-16869, does not poses a substantial practical threat to ElasticSearch 6 [1]. We agree that this issue would be difficult to exploit both these vulnerabilities on OpenShift Container Platform, so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships a vulnerable version of netty embedded in Candlepin. However, the flaw can not be triggered in that context, because HTTP requests are handled by Tomcat, not by netty. A future release may fix this.\n\n[1] https://github.com/elastic/elasticsearch/issues/49396", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ 7.4.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-20445" }, { "category": "external", "summary": "RHBZ#1798509", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798509" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20445", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20445" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20445", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20445" } ], "release_date": "2020-01-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-14T13:04:37+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ 7.4.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1445" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Red Hat AMQ 7.4.3" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat AMQ 7.4.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header" }, { "cve": "CVE-2020-7238", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2020-01-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1796225" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty, where it mishandles Transfer-Encoding whitespace. This flaw allows HTTP Request Smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that the previous vulnerability, CVE-2019-16869, does not poses a substantial practical threat to ElasticSearch 6 [1]. We agree that this issue would be difficult to exploit both these vulnerabilities on OpenShift Container Platform, so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships vulnerable netty version embedded in Candlepin, however, is not directly vulnerable since HTTP requests are handled by Tomcat and not netty.\n\n[1] https://github.com/elastic/elasticsearch/issues/49396", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ 7.4.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-7238" }, { "category": "external", "summary": "RHBZ#1796225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796225" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-7238", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7238" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-7238", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7238" }, { "category": "external", "summary": "https://netty.io/news/2019/12/18/4-1-44-Final.html", "url": "https://netty.io/news/2019/12/18/4-1-44-Final.html" } ], "release_date": "2020-01-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-14T13:04:37+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ 7.4.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1445" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Red Hat AMQ 7.4.3" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat AMQ 7.4.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling" } ] }
rhsa-2019:2925
Vulnerability from csaf_redhat
Published
2019-09-30 15:15
Modified
2025-08-07 09:56
Summary
Red Hat Security Advisory: nodejs:10 security update
Notes
Topic
An update for the nodejs:10 module is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs (10.16.3).
Security Fix(es):
* HTTP/2: large amount of data requests leads to denial of service (CVE-2019-9511)
* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)
* HTTP/2: flood using PRIORITY frames results in excessive resource consumption (CVE-2019-9513)
* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)
* HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)
* HTTP/2: 0-length headers lead to denial of service (CVE-2019-9516)
* HTTP/2: request for large response leads to denial of service (CVE-2019-9517)
* HTTP/2: flood using empty frames results in excessive resource consumption (CVE-2019-9518)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the nodejs:10 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.\n\nThe following packages have been upgraded to a later upstream version: nodejs (10.16.3).\n\nSecurity Fix(es):\n\n* HTTP/2: large amount of data requests leads to denial of service (CVE-2019-9511)\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using PRIORITY frames results in excessive resource consumption (CVE-2019-9513)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\n* HTTP/2: 0-length headers lead to denial of service (CVE-2019-9516)\n\n* HTTP/2: request for large response leads to denial of service (CVE-2019-9517)\n\n* HTTP/2: flood using empty frames results in excessive resource consumption (CVE-2019-9518)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:2925", "url": "https://access.redhat.com/errata/RHSA-2019:2925" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735741", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735741" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "1741864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741864" }, { "category": "external", "summary": "1741868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741868" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2925.json" } ], "title": "Red Hat Security Advisory: nodejs:10 security update", "tracking": { "current_release_date": "2025-08-07T09:56:06+00:00", "generator": { "date": "2025-08-07T09:56:06+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2019:2925", "initial_release_date": "2019-09-30T15:15:54+00:00", "revision_history": [ { "date": "2019-09-30T15:15:54+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-09-30T15:15:54+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-07T09:56:06+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "nodejs:10:8000020190911085529:f8e95b4e", "product": { "name": "nodejs:10:8000020190911085529:f8e95b4e", "product_id": "nodejs:10:8000020190911085529:f8e95b4e", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@10?rpmmod=nodejs:10:8000020190911085529:f8e95b4e" } } }, { "category": "product_version", "name": "nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "product": { "name": "nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "product_id": "nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-docs@10.16.3-2.module%2Bel8.0.0%2B4214%2B49953fda?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "product": { "name": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "product_id": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-nodemon@1.18.3-1.module%2Bel8%2B2632%2B6c5111ed?arch=noarch" } } }, { "category": "product_version", "name": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "product": { "name": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "product_id": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-packaging@17-3.module%2Bel8%2B2873%2Baa7dfd9a?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "product": { "name": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "product_id": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@10.16.3-2.module%2Bel8.0.0%2B4214%2B49953fda?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "product": { "name": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "product_id": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-nodemon@1.18.3-1.module%2Bel8%2B2632%2B6c5111ed?arch=src" } } }, { "category": "product_version", "name": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "product": { "name": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "product_id": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-packaging@17-3.module%2Bel8%2B2873%2Baa7dfd9a?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "product": { "name": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "product_id": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@10.16.3-2.module%2Bel8.0.0%2B4214%2B49953fda?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "product": { "name": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "product_id": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@10.16.3-2.module%2Bel8.0.0%2B4214%2B49953fda?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "product": { "name": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "product_id": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@10.16.3-2.module%2Bel8.0.0%2B4214%2B49953fda?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "product": { "name": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "product_id": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@10.16.3-2.module%2Bel8.0.0%2B4214%2B49953fda?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "product": { "name": "nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "product_id": "nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel-debuginfo@10.16.3-2.module%2Bel8.0.0%2B4214%2B49953fda?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64", "product": { "name": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64", "product_id": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.9.0-1.10.16.3.2.module%2Bel8.0.0%2B4214%2B49953fda?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "product": { "name": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "product_id": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@10.16.3-2.module%2Bel8.0.0%2B4214%2B49953fda?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "product": { "name": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "product_id": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@10.16.3-2.module%2Bel8.0.0%2B4214%2B49953fda?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "product": { "name": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "product_id": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@10.16.3-2.module%2Bel8.0.0%2B4214%2B49953fda?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "product": { "name": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "product_id": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@10.16.3-2.module%2Bel8.0.0%2B4214%2B49953fda?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "product": { "name": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "product_id": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.9.0-1.10.16.3.2.module%2Bel8.0.0%2B4214%2B49953fda?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "product": { "name": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "product_id": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@10.16.3-2.module%2Bel8.0.0%2B4214%2B49953fda?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "product": { "name": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "product_id": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@10.16.3-2.module%2Bel8.0.0%2B4214%2B49953fda?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "product": { "name": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "product_id": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@10.16.3-2.module%2Bel8.0.0%2B4214%2B49953fda?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "product": { "name": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "product_id": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@10.16.3-2.module%2Bel8.0.0%2B4214%2B49953fda?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "product": { "name": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "product_id": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.9.0-1.10.16.3.2.module%2Bel8.0.0%2B4214%2B49953fda?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "product": { "name": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "product_id": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@10.16.3-2.module%2Bel8.0.0%2B4214%2B49953fda?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "product": { "name": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "product_id": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@10.16.3-2.module%2Bel8.0.0%2B4214%2B49953fda?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "product": { "name": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "product_id": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@10.16.3-2.module%2Bel8.0.0%2B4214%2B49953fda?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "product": { "name": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "product_id": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@10.16.3-2.module%2Bel8.0.0%2B4214%2B49953fda?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "product": { "name": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "product_id": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.9.0-1.10.16.3.2.module%2Bel8.0.0%2B4214%2B49953fda?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, "product_reference": "nodejs:10:8000020190911085529:f8e95b4e", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64 as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64" }, "product_reference": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le" }, "product_reference": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x" }, "product_reference": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src" }, "product_reference": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64 as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64" }, "product_reference": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64 as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64" }, "product_reference": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le" }, "product_reference": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x" }, "product_reference": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64 as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64" }, "product_reference": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64 as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64" }, "product_reference": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le" }, "product_reference": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x" }, "product_reference": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64 as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64" }, "product_reference": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64 as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64" }, "product_reference": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le" }, "product_reference": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x" }, "product_reference": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64 as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64" }, "product_reference": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64 as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64" }, "product_reference": "nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch" }, "product_reference": "nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch" }, "product_reference": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src" }, "product_reference": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch" }, "product_reference": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src" }, "product_reference": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64 as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64" }, "product_reference": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le" }, "product_reference": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x" }, "product_reference": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64 as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" }, "product_reference": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-5737", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-03-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1690808" } ], "notes": [ { "category": "description", "text": "It was found that the original fix for Slowloris, CVE-2018-12122, was insufficient. It is possible to bypass the server\u0027s headersTimeout by sending two specially crafted HTTP requests in the same connection. An attacker could use this flaw to bypass Slowloris protection, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: Insufficient Slowloris fix causing DoS via server.headersTimeout bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-5737" }, { "category": "external", "summary": "RHBZ#1690808", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1690808" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-5737", "url": "https://www.cve.org/CVERecord?id=CVE-2019-5737" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-5737", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5737" }, { "category": "external", "summary": "https://nodejs.org/ja/blog/vulnerability/february-2019-security-releases/", "url": "https://nodejs.org/ja/blog/vulnerability/february-2019-security-releases/" } ], "release_date": "2019-02-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-30T15:15:54+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2925" }, { "category": "workaround", "details": "The use of a Load Balancer or a Reverse Proxy will increase the difficulty of the attack.", "product_ids": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "nodejs: Insufficient Slowloris fix causing DoS via server.headersTimeout bypass" }, { "cve": "CVE-2019-9511", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741860" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker can request a large amount of data by manipulating window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this queue can consume excess CPU, memory, or both, leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: large amount of data requests leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "There are no mitigations available for nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9511" }, { "category": "external", "summary": "RHBZ#1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9511", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9511" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-30T15:15:54+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2925" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: large amount of data requests leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-30T15:15:54+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2925" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9513", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735741" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker, using PRIORITY frames to flood the system, could cause excessive CPU usage and starvation of other clients. The largest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PRIORITY frames results in excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for packages nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9513" }, { "category": "external", "summary": "RHBZ#1735741", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735741" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9513", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9513" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9513", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9513" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nghttp2.org/blog/2019/08/19/nghttp2-v1-39-2/", "url": "https://nghttp2.org/blog/2019/08/19/nghttp2-v1-39-2/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-30T15:15:54+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2925" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PRIORITY frames results in excessive resource consumption" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-30T15:15:54+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2925" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-30T15:15:54+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2925" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "cve": "CVE-2019-9516", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741864" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker, sending a stream of header with a 0-length header name and a 0-length header value, could cause some implementations to allocate memory for these headers and keep the allocations alive until the session dies. The can consume excess memory, potentially leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: 0-length headers lead to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9516" }, { "category": "external", "summary": "RHBZ#1741864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741864" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9516", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9516" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9516", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9516" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://github.com/nghttp2/nghttp2/issues/1382#", "url": "https://github.com/nghttp2/nghttp2/issues/1382#" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-30T15:15:54+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2925" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: 0-length headers lead to denial of service" }, { "cve": "CVE-2019-9517", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741868" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in HTTP/2. An attacker can open a HTTP/2 window so the peer can send without constraint. The TCP window remains closed so the peer cannot write the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the server\u0027s queue is setup, the responses can consume excess memory, CPU, or both, potentially leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: request for large response leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "The package httpd versions as shipped with Red Hat Enterprise Linux 5, 6 and 7 are not affected by this issue as HTTP/2 support is not provided.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9517" }, { "category": "external", "summary": "RHBZ#1741868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741868" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9517", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9517" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9517", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9517" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-30T15:15:54+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2925" }, { "category": "workaround", "details": "The httpd version shipped with Red Hat Enterprise Linux 8 provides HTTP/2 support through mod_http2 package. While mod_http2 package is not updated, users can disable HTTP/2 support as mitigation action by executing the following steps:\n\n1. Stop httpd service:\n$ systemctl stop httpd\n\n2. Remove http/2 protocol support from configuration files:\n$ sed -i \u0027s/\\(h2\\)\\|\\(h2c\\)//g\u0027 \u003chttpd_config_file\u003e\n\n3. Validate configuration files to make sure all syntax is valid:\n$ apachectl configtest\n\n4. Restart httpd service:\n$ systemctl start httpd", "product_ids": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: request for large response leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9518", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735749" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using frames with an empty payload, a flood could occur that results in excessive CPU usage and starvation of other clients. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using empty frames results in excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9518" }, { "category": "external", "summary": "RHBZ#1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9518", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9518" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-30T15:15:54+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2925" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using empty frames results in excessive resource consumption" } ] }
rhsa-2019:2946
Vulnerability from csaf_redhat
Published
2019-10-01 13:40
Modified
2025-07-31 11:46
Summary
Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.29 SP3 security update
Notes
Topic
An update is now available for JBoss Core Services on RHEL 6 and RHEL 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.
Details
Red Hat JBoss Core Services is a set of supplementary software for Red Hat JBoss middleware products. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products, and is packaged under Red Hat JBoss Core Services to allow for faster distribution of updates, and for a more consistent update experience.
This release of Red Hat JBoss Core Services Apache HTTP Server 2.4.29 Service Pack 3 serves as an update to Red Hat JBoss Core Services Apache HTTP Server 2.4.29, and includes bug fixes for CVEs which are linked in the References section.
Security Fix(es):
* mod_http2: HTTP/2: 0-length headers leads to denial of service (CVE-2019-9516)
* mod_http2: HTTP/2: request for large response leads to denial of service (CVE-2019-9517)
Bug Fix(es):
* nghttp2: Rebase to 1.39.2
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for JBoss Core Services on RHEL 6 and RHEL 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Core Services is a set of supplementary software for Red Hat JBoss middleware products. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products, and is packaged under Red Hat JBoss Core Services to allow for faster distribution of updates, and for a more consistent update experience.\n\nThis release of Red Hat JBoss Core Services Apache HTTP Server 2.4.29 Service Pack 3 serves as an update to Red Hat JBoss Core Services Apache HTTP Server 2.4.29, and includes bug fixes for CVEs which are linked in the References section.\n\nSecurity Fix(es):\n\n* mod_http2: HTTP/2: 0-length headers leads to denial of service (CVE-2019-9516)\n\n* mod_http2: HTTP/2: request for large response leads to denial of service (CVE-2019-9517)\n\nBug Fix(es):\n\n* nghttp2: Rebase to 1.39.2\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:2946", "url": "https://access.redhat.com/errata/RHSA-2019:2946" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1741864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741864" }, { "category": "external", "summary": "1741868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741868" }, { "category": "external", "summary": "JBCS-826", "url": "https://issues.redhat.com/browse/JBCS-826" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2946.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.29 SP3 security update", "tracking": { "current_release_date": "2025-07-31T11:46:40+00:00", "generator": { "date": "2025-07-31T11:46:40+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2019:2946", "initial_release_date": "2019-10-01T13:40:45+00:00", "revision_history": [ { "date": "2019-10-01T13:40:45+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-10-01T13:40:45+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-07-31T11:46:40+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Core Services on RHEL 6 Server", "product": { "name": "Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_core_services:1::el6" } } }, { "category": "product_name", "name": "Red Hat JBoss Core Services on RHEL 7 Server", "product": { "name": "Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_core_services:1::el7" } } } ], "category": "product_family", "name": "Red Hat JBoss Core Services" }, { "branches": [ { "category": "product_version", "name": "jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el6.i686", "product_id": "jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2@1.39.2-1.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-devel-0:1.39.2-1.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-nghttp2-devel-0:1.39.2-1.jbcs.el6.i686", "product_id": "jbcs-httpd24-nghttp2-devel-0:1.39.2-1.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2-devel@1.39.2-1.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-1.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-1.jbcs.el6.i686", "product_id": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-1.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2-debuginfo@1.39.2-1.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el6.i686", "product_id": "jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.29-41.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-devel-0:2.4.29-41.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-httpd-devel-0:2.4.29-41.jbcs.el6.i686", "product_id": "jbcs-httpd24-httpd-devel-0:2.4.29-41.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-devel@2.4.29-41.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-selinux-0:2.4.29-41.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-httpd-selinux-0:2.4.29-41.jbcs.el6.i686", "product_id": "jbcs-httpd24-httpd-selinux-0:2.4.29-41.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-selinux@2.4.29-41.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-tools-0:2.4.29-41.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-httpd-tools-0:2.4.29-41.jbcs.el6.i686", "product_id": "jbcs-httpd24-httpd-tools-0:2.4.29-41.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-tools@2.4.29-41.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ldap-0:2.4.29-41.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_ldap-0:2.4.29-41.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_ldap-0:2.4.29-41.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ldap@2.4.29-41.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_proxy_html-1:2.4.29-41.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_proxy_html-1:2.4.29-41.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_proxy_html-1:2.4.29-41.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html@2.4.29-41.jbcs.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_session-0:2.4.29-41.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_session-0:2.4.29-41.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_session-0:2.4.29-41.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_session@2.4.29-41.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ssl-1:2.4.29-41.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_ssl-1:2.4.29-41.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_ssl-1:2.4.29-41.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ssl@2.4.29-41.jbcs.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.29-41.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.29-41.jbcs.el6.i686", "product_id": "jbcs-httpd24-httpd-debuginfo-0:2.4.29-41.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-debuginfo@2.4.29-41.jbcs.el6?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2@1.39.2-1.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-devel-0:1.39.2-1.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-nghttp2-devel-0:1.39.2-1.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-nghttp2-devel-0:1.39.2-1.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2-devel@1.39.2-1.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-1.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-1.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-1.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2-debuginfo@1.39.2-1.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.29-41.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-devel-0:2.4.29-41.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-httpd-devel-0:2.4.29-41.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-httpd-devel-0:2.4.29-41.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-devel@2.4.29-41.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-selinux-0:2.4.29-41.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-httpd-selinux-0:2.4.29-41.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-httpd-selinux-0:2.4.29-41.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-selinux@2.4.29-41.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-tools-0:2.4.29-41.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-httpd-tools-0:2.4.29-41.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-httpd-tools-0:2.4.29-41.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-tools@2.4.29-41.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ldap-0:2.4.29-41.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_ldap-0:2.4.29-41.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_ldap-0:2.4.29-41.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ldap@2.4.29-41.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_proxy_html-1:2.4.29-41.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_proxy_html-1:2.4.29-41.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_proxy_html-1:2.4.29-41.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html@2.4.29-41.jbcs.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_session-0:2.4.29-41.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_session-0:2.4.29-41.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_session-0:2.4.29-41.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_session@2.4.29-41.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ssl-1:2.4.29-41.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_ssl-1:2.4.29-41.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_ssl-1:2.4.29-41.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ssl@2.4.29-41.jbcs.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.29-41.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.29-41.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-httpd-debuginfo-0:2.4.29-41.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-debuginfo@2.4.29-41.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2@1.39.2-1.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-devel-0:1.39.2-1.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-nghttp2-devel-0:1.39.2-1.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-nghttp2-devel-0:1.39.2-1.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2-devel@1.39.2-1.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-1.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-1.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-1.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2-debuginfo@1.39.2-1.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.29-41.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-devel-0:2.4.29-41.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-httpd-devel-0:2.4.29-41.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-httpd-devel-0:2.4.29-41.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-devel@2.4.29-41.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-selinux-0:2.4.29-41.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-httpd-selinux-0:2.4.29-41.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-httpd-selinux-0:2.4.29-41.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-selinux@2.4.29-41.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-tools-0:2.4.29-41.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-httpd-tools-0:2.4.29-41.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-httpd-tools-0:2.4.29-41.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-tools@2.4.29-41.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ldap-0:2.4.29-41.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_ldap-0:2.4.29-41.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_ldap-0:2.4.29-41.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ldap@2.4.29-41.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_proxy_html-1:2.4.29-41.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_proxy_html-1:2.4.29-41.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_proxy_html-1:2.4.29-41.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html@2.4.29-41.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_session-0:2.4.29-41.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_session-0:2.4.29-41.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_session-0:2.4.29-41.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_session@2.4.29-41.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ssl-1:2.4.29-41.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_ssl-1:2.4.29-41.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_ssl-1:2.4.29-41.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ssl@2.4.29-41.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.29-41.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.29-41.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-httpd-debuginfo-0:2.4.29-41.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-debuginfo@2.4.29-41.jbcs.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el6.src", "product": { "name": "jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el6.src", "product_id": "jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2@1.39.2-1.jbcs.el6?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el6.src", "product": { "name": "jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el6.src", "product_id": "jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.29-41.jbcs.el6?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el7.src", "product": { "name": "jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el7.src", "product_id": "jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2@1.39.2-1.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el7.src", "product": { "name": "jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el7.src", "product_id": "jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.29-41.jbcs.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "jbcs-httpd24-httpd-manual-0:2.4.29-41.jbcs.el6.noarch", "product": { "name": "jbcs-httpd24-httpd-manual-0:2.4.29-41.jbcs.el6.noarch", "product_id": "jbcs-httpd24-httpd-manual-0:2.4.29-41.jbcs.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-manual@2.4.29-41.jbcs.el6?arch=noarch" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-manual-0:2.4.29-41.jbcs.el7.noarch", "product": { "name": "jbcs-httpd24-httpd-manual-0:2.4.29-41.jbcs.el7.noarch", "product_id": "jbcs-httpd24-httpd-manual-0:2.4.29-41.jbcs.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-manual@2.4.29-41.jbcs.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el6.src as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el6.src" }, "product_reference": "jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el6.src", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.29-41.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-41.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-httpd-debuginfo-0:2.4.29-41.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.29-41.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-41.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-httpd-debuginfo-0:2.4.29-41.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-devel-0:2.4.29-41.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-41.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-httpd-devel-0:2.4.29-41.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-devel-0:2.4.29-41.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-41.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-httpd-devel-0:2.4.29-41.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-manual-0:2.4.29-41.jbcs.el6.noarch as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-41.jbcs.el6.noarch" }, "product_reference": "jbcs-httpd24-httpd-manual-0:2.4.29-41.jbcs.el6.noarch", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-selinux-0:2.4.29-41.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-41.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-httpd-selinux-0:2.4.29-41.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-selinux-0:2.4.29-41.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-41.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-httpd-selinux-0:2.4.29-41.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-tools-0:2.4.29-41.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-41.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-httpd-tools-0:2.4.29-41.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-tools-0:2.4.29-41.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-41.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-httpd-tools-0:2.4.29-41.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ldap-0:2.4.29-41.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-41.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_ldap-0:2.4.29-41.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ldap-0:2.4.29-41.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-41.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_ldap-0:2.4.29-41.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_proxy_html-1:2.4.29-41.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-41.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_proxy_html-1:2.4.29-41.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_proxy_html-1:2.4.29-41.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-41.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_proxy_html-1:2.4.29-41.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_session-0:2.4.29-41.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-41.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_session-0:2.4.29-41.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_session-0:2.4.29-41.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-41.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_session-0:2.4.29-41.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ssl-1:2.4.29-41.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-41.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_ssl-1:2.4.29-41.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ssl-1:2.4.29-41.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-41.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_ssl-1:2.4.29-41.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el6.src as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el6.src" }, "product_reference": "jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el6.src", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-1.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-1.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-1.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-1.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-1.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-1.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-devel-0:1.39.2-1.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-1.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-nghttp2-devel-0:1.39.2-1.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-devel-0:1.39.2-1.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-1.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-nghttp2-devel-0:1.39.2-1.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.29-41.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-41.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-httpd-debuginfo-0:2.4.29-41.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-devel-0:2.4.29-41.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-41.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-httpd-devel-0:2.4.29-41.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-manual-0:2.4.29-41.jbcs.el7.noarch as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-41.jbcs.el7.noarch" }, "product_reference": "jbcs-httpd24-httpd-manual-0:2.4.29-41.jbcs.el7.noarch", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-selinux-0:2.4.29-41.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-41.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-httpd-selinux-0:2.4.29-41.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-tools-0:2.4.29-41.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-41.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-httpd-tools-0:2.4.29-41.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ldap-0:2.4.29-41.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-41.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_ldap-0:2.4.29-41.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_proxy_html-1:2.4.29-41.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-41.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_proxy_html-1:2.4.29-41.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_session-0:2.4.29-41.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-41.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_session-0:2.4.29-41.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ssl-1:2.4.29-41.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-41.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_ssl-1:2.4.29-41.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-1.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-1.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-1.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-devel-0:1.39.2-1.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-1.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-nghttp2-devel-0:1.39.2-1.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-9511", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741860" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker can request a large amount of data by manipulating window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this queue can consume excess CPU, memory, or both, leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: large amount of data requests leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "There are no mitigations available for nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-41.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-1.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-41.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-1.jbcs.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9511" }, { "category": "external", "summary": "RHBZ#1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9511", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9511" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-01T13:40:45+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-41.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-1.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-41.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-1.jbcs.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2946" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-41.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-1.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-41.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-1.jbcs.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-41.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-1.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-41.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-1.jbcs.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: large amount of data requests leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9513", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735741" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker, using PRIORITY frames to flood the system, could cause excessive CPU usage and starvation of other clients. The largest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PRIORITY frames results in excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for packages nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-41.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-1.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-41.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-1.jbcs.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9513" }, { "category": "external", "summary": "RHBZ#1735741", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735741" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9513", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9513" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9513", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9513" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nghttp2.org/blog/2019/08/19/nghttp2-v1-39-2/", "url": "https://nghttp2.org/blog/2019/08/19/nghttp2-v1-39-2/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-01T13:40:45+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-41.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-1.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-41.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-1.jbcs.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2946" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-41.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-1.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-41.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-1.jbcs.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-41.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-1.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-41.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-1.jbcs.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PRIORITY frames results in excessive resource consumption" }, { "cve": "CVE-2019-9516", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741864" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker, sending a stream of header with a 0-length header name and a 0-length header value, could cause some implementations to allocate memory for these headers and keep the allocations alive until the session dies. The can consume excess memory, potentially leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: 0-length headers lead to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-41.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-1.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-41.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-1.jbcs.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9516" }, { "category": "external", "summary": "RHBZ#1741864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741864" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9516", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9516" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9516", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9516" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://github.com/nghttp2/nghttp2/issues/1382#", "url": "https://github.com/nghttp2/nghttp2/issues/1382#" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-01T13:40:45+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-41.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-1.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-41.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-1.jbcs.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2946" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-41.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-1.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-41.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-1.jbcs.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-41.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-1.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-41.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-1.jbcs.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: 0-length headers lead to denial of service" }, { "cve": "CVE-2019-9517", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741868" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in HTTP/2. An attacker can open a HTTP/2 window so the peer can send without constraint. The TCP window remains closed so the peer cannot write the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the server\u0027s queue is setup, the responses can consume excess memory, CPU, or both, potentially leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: request for large response leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "The package httpd versions as shipped with Red Hat Enterprise Linux 5, 6 and 7 are not affected by this issue as HTTP/2 support is not provided.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-41.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-1.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-41.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-1.jbcs.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9517" }, { "category": "external", "summary": "RHBZ#1741868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741868" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9517", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9517" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9517", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9517" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-01T13:40:45+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-41.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-1.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-41.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-1.jbcs.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2946" }, { "category": "workaround", "details": "The httpd version shipped with Red Hat Enterprise Linux 8 provides HTTP/2 support through mod_http2 package. While mod_http2 package is not updated, users can disable HTTP/2 support as mitigation action by executing the following steps:\n\n1. Stop httpd service:\n$ systemctl stop httpd\n\n2. Remove http/2 protocol support from configuration files:\n$ sed -i \u0027s/\\(h2\\)\\|\\(h2c\\)//g\u0027 \u003chttpd_config_file\u003e\n\n3. Validate configuration files to make sure all syntax is valid:\n$ apachectl configtest\n\n4. Restart httpd service:\n$ systemctl start httpd", "product_ids": [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-41.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-1.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-41.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-1.jbcs.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-41.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-41.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-41.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-1.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-41.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-41.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-1.jbcs.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: request for large response leads to denial of service" } ] }
rhsa-2020:0922
Vulnerability from csaf_redhat
Published
2020-03-23 08:21
Modified
2025-08-07 09:56
Summary
Red Hat Security Advisory: Red Hat AMQ Broker 7.6 release and security update
Notes
Topic
Red Hat AMQ Broker 7.6 is now available from the Red Hat Customer Portal.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
AMQ Broker is a high-performance messaging implementation based on ActiveMQ Artemis. It uses an asynchronous journal for fast message persistence, and supports multiple languages, protocols, and platforms.
This release of Red Hat AMQ Broker 7.6.0 serves as a replacement for Red Hat AMQ Broker 7.5.0, and includes security and bug fixes, and enhancements. For further information, refer to the release notes linked to in the References section.
Security Fix(es):
* netty: HTTP request smuggling (CVE-2019-20444)
* netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header (CVE-2019-20445)
* jetty: HTTP/2: large amount of data requests leads to denial of service (CVE-2019-9511)
* jetty: HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)
* jetty: HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)
* jetty: HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)
* jetty: HTTP/2: 0-length headers lead to denial of service (CVE-2019-9516)
* jetty: HTTP/2: request for large response leads to denial of service (CVE-2019-9517)
* jetty: HTTP/2: flood using empty frames results in excessive resource consumption (CVE-2019-9518)
* jetty: using specially formatted URL against DefaultServlet or ResourceHandler leads to XSS conditions (CVE-2019-10241)
* jetty: error path information disclosure (CVE-2019-10247)
* mqtt-client: activemq: Corrupt MQTT frame can cause broker shutdown (CVE-2019-0222)
* netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers (CVE-2019-16869)
* netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling (CVE-2020-7238)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat AMQ Broker 7.6 is now available from the Red Hat Customer Portal.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "AMQ Broker is a high-performance messaging implementation based on ActiveMQ Artemis. It uses an asynchronous journal for fast message persistence, and supports multiple languages, protocols, and platforms. \n\nThis release of Red Hat AMQ Broker 7.6.0 serves as a replacement for Red Hat AMQ Broker 7.5.0, and includes security and bug fixes, and enhancements. For further information, refer to the release notes linked to in the References section.\n\nSecurity Fix(es):\n\n* netty: HTTP request smuggling (CVE-2019-20444)\n\n* netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header (CVE-2019-20445)\n\n* jetty: HTTP/2: large amount of data requests leads to denial of service (CVE-2019-9511)\n\n* jetty: HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* jetty: HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* jetty: HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\n* jetty: HTTP/2: 0-length headers lead to denial of service (CVE-2019-9516)\n\n* jetty: HTTP/2: request for large response leads to denial of service (CVE-2019-9517)\n\n* jetty: HTTP/2: flood using empty frames results in excessive resource consumption (CVE-2019-9518)\n\n* jetty: using specially formatted URL against DefaultServlet or ResourceHandler leads to XSS conditions (CVE-2019-10241)\n\n* jetty: error path information disclosure (CVE-2019-10247)\n\n* mqtt-client: activemq: Corrupt MQTT frame can cause broker shutdown (CVE-2019-0222)\n\n* netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers (CVE-2019-16869)\n\n* netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling (CVE-2020-7238)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:0922", "url": "https://access.redhat.com/errata/RHSA-2020:0922" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=jboss.amq.broker\u0026version=7.6.0\u0026productChanged=yes", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=jboss.amq.broker\u0026version=7.6.0\u0026productChanged=yes" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_amq/7.6/", "url": "https://access.redhat.com/documentation/en-us/red_hat_amq/7.6/" }, { "category": "external", "summary": "1696012", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1696012" }, { "category": "external", "summary": "1705924", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1705924" }, { "category": "external", "summary": "1705993", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1705993" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "1741864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741864" }, { "category": "external", "summary": "1741868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741868" }, { "category": "external", "summary": "1758619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758619" }, { "category": "external", "summary": "1796225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796225" }, { "category": "external", "summary": "1798509", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798509" }, { "category": "external", "summary": "1798524", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798524" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_0922.json" } ], "title": "Red Hat Security Advisory: Red Hat AMQ Broker 7.6 release and security update", "tracking": { "current_release_date": "2025-08-07T09:56:35+00:00", "generator": { "date": "2025-08-07T09:56:35+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2020:0922", "initial_release_date": "2020-03-23T08:21:33+00:00", "revision_history": [ { "date": "2020-03-23T08:21:33+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-03-23T08:21:33+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-07T09:56:35+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat AMQ", "product": { "name": "Red Hat AMQ", "product_id": "Red Hat AMQ", "product_identification_helper": { "cpe": "cpe:/a:redhat:amq_broker:7" } } } ], "category": "product_family", "name": "Red Hat JBoss AMQ" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-0222", "discovery_date": "2019-03-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1696012" } ], "notes": [ { "category": "description", "text": "In Apache ActiveMQ 5.0.0 - 5.15.8, unmarshalling corrupt MQTT frame can lead to broker Out of Memory exception making it unresponsive.", "title": "Vulnerability description" }, { "category": "summary", "text": "activemq: Corrupt MQTT frame can cause broker shutdown", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-0222" }, { "category": "external", "summary": "RHBZ#1696012", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1696012" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-0222", "url": "https://www.cve.org/CVERecord?id=CVE-2019-0222" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0222", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0222" } ], "release_date": "2019-03-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-23T08:21:33+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0922" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "activemq: Corrupt MQTT frame can cause broker shutdown" }, { "cve": "CVE-2019-9511", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741860" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker can request a large amount of data by manipulating window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this queue can consume excess CPU, memory, or both, leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: large amount of data requests leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "There are no mitigations available for nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9511" }, { "category": "external", "summary": "RHBZ#1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9511", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9511" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-23T08:21:33+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0922" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "Red Hat AMQ" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTP/2: large amount of data requests leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-23T08:21:33+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0922" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-23T08:21:33+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0922" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-23T08:21:33+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0922" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "cve": "CVE-2019-9516", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741864" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker, sending a stream of header with a 0-length header name and a 0-length header value, could cause some implementations to allocate memory for these headers and keep the allocations alive until the session dies. The can consume excess memory, potentially leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: 0-length headers lead to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9516" }, { "category": "external", "summary": "RHBZ#1741864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741864" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9516", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9516" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9516", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9516" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://github.com/nghttp2/nghttp2/issues/1382#", "url": "https://github.com/nghttp2/nghttp2/issues/1382#" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-23T08:21:33+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0922" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "Red Hat AMQ" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTP/2: 0-length headers lead to denial of service" }, { "cve": "CVE-2019-9517", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741868" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in HTTP/2. An attacker can open a HTTP/2 window so the peer can send without constraint. The TCP window remains closed so the peer cannot write the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the server\u0027s queue is setup, the responses can consume excess memory, CPU, or both, potentially leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: request for large response leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "The package httpd versions as shipped with Red Hat Enterprise Linux 5, 6 and 7 are not affected by this issue as HTTP/2 support is not provided.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9517" }, { "category": "external", "summary": "RHBZ#1741868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741868" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9517", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9517" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9517", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9517" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-23T08:21:33+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0922" }, { "category": "workaround", "details": "The httpd version shipped with Red Hat Enterprise Linux 8 provides HTTP/2 support through mod_http2 package. While mod_http2 package is not updated, users can disable HTTP/2 support as mitigation action by executing the following steps:\n\n1. Stop httpd service:\n$ systemctl stop httpd\n\n2. Remove http/2 protocol support from configuration files:\n$ sed -i \u0027s/\\(h2\\)\\|\\(h2c\\)//g\u0027 \u003chttpd_config_file\u003e\n\n3. Validate configuration files to make sure all syntax is valid:\n$ apachectl configtest\n\n4. Restart httpd service:\n$ systemctl start httpd", "product_ids": [ "Red Hat AMQ" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTP/2: request for large response leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9518", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735749" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using frames with an empty payload, a flood could occur that results in excessive CPU usage and starvation of other clients. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using empty frames results in excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9518" }, { "category": "external", "summary": "RHBZ#1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9518", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9518" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-23T08:21:33+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0922" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTP/2: flood using empty frames results in excessive resource consumption" }, { "cve": "CVE-2019-10241", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2019-04-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1705924" } ], "notes": [ { "category": "description", "text": "In Eclipse Jetty version 9.2.26 and older, 9.3.25 and older, and 9.4.15 and older, the server is vulnerable to XSS conditions if a remote client USES a specially formatted URL against the DefaultServlet or ResourceHandler that is configured for showing a Listing of directory contents.", "title": "Vulnerability description" }, { "category": "summary", "text": "jetty: using specially formatted URL against DefaultServlet or ResourceHandler leads to XSS conditions", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of jetty which is embedded in the nutch package as shipped with Red Hat Satellite 5. The jetty server is not exposed, as such exploitation is difficult, Red Hat Product Security has rated this issue as having security impact of Low in the context of Red Hat Satellite 5. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10241" }, { "category": "external", "summary": "RHBZ#1705924", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1705924" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10241", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10241" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10241", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10241" } ], "release_date": "2019-04-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-23T08:21:33+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0922" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", "version": "3.0" }, "products": [ "Red Hat AMQ" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jetty: using specially formatted URL against DefaultServlet or ResourceHandler leads to XSS conditions" }, { "cve": "CVE-2019-10247", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-04-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1705993" } ], "notes": [ { "category": "description", "text": "In Eclipse Jetty version 7.x, 8.x, 9.2.27 and older, 9.3.26 and older, and 9.4.16 and older, the server running on any OS and Jetty version combination will reveal the configured fully qualified directory base resource location on the output of the 404 error for not finding a Context that matches the requested path. The default server behavior on jetty-distribution and jetty-home will include at the end of the Handler tree a DefaultHandler, which is responsible for reporting this 404 error, it presents the various configured contexts as HTML for users to click through to. This produced HTML includes output that contains the configured fully qualified directory base resource location for each context.", "title": "Vulnerability description" }, { "category": "summary", "text": "jetty: error path information disclosure", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of jetty which is embedded in the nutch package as shipped with Red Hat Satellite 5. The jetty server is not exposed, as such exploitation is difficult, Red Hat Product Security has rated this issue as having security impact of Low in the context of Red Hat Satellite 5. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10247" }, { "category": "external", "summary": "RHBZ#1705993", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1705993" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10247", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10247" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10247", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10247" } ], "release_date": "2019-04-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-23T08:21:33+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0922" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat AMQ" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "jetty: error path information disclosure" }, { "cve": "CVE-2019-16869", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2019-09-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1758619" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty, where whitespace before the colon in HTTP headers is mishandled. This flaw allows an attacker to cause HTTP request smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that this vulnerability does not poses a substantial practical threat to ElasticSearch 6 [1]. We agree that this issue would be difficult to exploit these vulnerabilities on OpenShift Container Platform, so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships vulnerable netty version embedded in Candlepin, however, is not directly vulnerable since HTTP requests are handled by Tomcat and not netty.\n\n[1] https://github.com/elastic/elasticsearch/issues/49396", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-16869" }, { "category": "external", "summary": "RHBZ#1758619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758619" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16869", "url": "https://www.cve.org/CVERecord?id=CVE-2019-16869" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16869", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16869" } ], "release_date": "2019-09-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-23T08:21:33+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0922" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Red Hat AMQ" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "Red Hat AMQ" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers" }, { "cve": "CVE-2019-20444", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2020-01-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1798524" } ], "notes": [ { "category": "description", "text": "A HTTP smuggling flaw was found in HttpObjectDecoder.java in Netty in versions prior to version 4.1.44. HTTP headers with an invalid fold, in this case CRLF (carriage return, line feed) without being followed by SP (space) or HTAB (horizontal tab), result in situations where headers can be misread. Data integrity is the highest threat with this vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HTTP request smuggling", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that the previous vulnerability, CVE-2019-16869, does not pose a substantial practical threat to ElasticSearch 6. We agree that these issues would be difficult to exploit on OpenShift Container Platform so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships a vulnerable version of netty embedded in Candlepin. However, the flaw can not be triggered in that context, because HTTP requests are handled by Tomcat, not by netty. A future release may fix this.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-20444" }, { "category": "external", "summary": "RHBZ#1798524", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798524" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20444", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20444" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20444", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20444" }, { "category": "external", "summary": "https://github.com/elastic/elasticsearch/issues/49396", "url": "https://github.com/elastic/elasticsearch/issues/49396" } ], "release_date": "2020-01-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-23T08:21:33+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0922" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Red Hat AMQ" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat AMQ" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HTTP request smuggling" }, { "cve": "CVE-2019-20445", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2020-01-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1798509" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty before version 4.1.44, where it accepted multiple Content-Length headers and also accepted both Transfer-Encoding, as well as Content-Length headers where it should reject the message under such circumstances. In circumstances where Netty is used in the context of a server, it could result in a viable HTTP smuggling vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that the previous vulnerability, CVE-2019-16869, does not poses a substantial practical threat to ElasticSearch 6 [1]. We agree that this issue would be difficult to exploit both these vulnerabilities on OpenShift Container Platform, so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships a vulnerable version of netty embedded in Candlepin. However, the flaw can not be triggered in that context, because HTTP requests are handled by Tomcat, not by netty. A future release may fix this.\n\n[1] https://github.com/elastic/elasticsearch/issues/49396", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-20445" }, { "category": "external", "summary": "RHBZ#1798509", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798509" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20445", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20445" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20445", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20445" } ], "release_date": "2020-01-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-23T08:21:33+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0922" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Red Hat AMQ" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat AMQ" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header" }, { "cve": "CVE-2020-7238", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2020-01-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1796225" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty, where it mishandles Transfer-Encoding whitespace. This flaw allows HTTP Request Smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that the previous vulnerability, CVE-2019-16869, does not poses a substantial practical threat to ElasticSearch 6 [1]. We agree that this issue would be difficult to exploit both these vulnerabilities on OpenShift Container Platform, so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships vulnerable netty version embedded in Candlepin, however, is not directly vulnerable since HTTP requests are handled by Tomcat and not netty.\n\n[1] https://github.com/elastic/elasticsearch/issues/49396", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-7238" }, { "category": "external", "summary": "RHBZ#1796225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796225" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-7238", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7238" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-7238", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7238" }, { "category": "external", "summary": "https://netty.io/news/2019/12/18/4-1-44-Final.html", "url": "https://netty.io/news/2019/12/18/4-1-44-Final.html" } ], "release_date": "2020-01-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-23T08:21:33+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0922" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Red Hat AMQ" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat AMQ" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling" } ] }
rhsa-2019:2893
Vulnerability from csaf_redhat
Published
2019-09-24 13:54
Modified
2025-07-31 11:46
Summary
Red Hat Security Advisory: httpd:2.4 security update
Notes
Topic
An update for the httpd:2.4 module is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* HTTP/2: request for large response leads to denial of service (CVE-2019-9517)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the httpd:2.4 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* HTTP/2: request for large response leads to denial of service (CVE-2019-9517)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:2893", "url": "https://access.redhat.com/errata/RHSA-2019:2893" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1741868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741868" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2893.json" } ], "title": "Red Hat Security Advisory: httpd:2.4 security update", "tracking": { "current_release_date": "2025-07-31T11:46:14+00:00", "generator": { "date": "2025-07-31T11:46:14+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2019:2893", "initial_release_date": "2019-09-24T13:54:21+00:00", "revision_history": [ { "date": "2019-09-24T13:54:21+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-09-24T13:54:21+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-07-31T11:46:14+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "httpd:2.4:8000020190829150747:f8e95b4e", "product": { "name": "httpd:2.4:8000020190829150747:f8e95b4e", "product_id": "httpd:2.4:8000020190829150747:f8e95b4e", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4?rpmmod=httpd:2.4:8000020190829150747:f8e95b4e" } } }, { "category": "product_version", "name": "httpd-filesystem-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.noarch", "product": { "name": "httpd-filesystem-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.noarch", "product_id": "httpd-filesystem-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-filesystem@2.4.37-12.module%2Bel8.0.0%2B4096%2Beb40e6da?arch=noarch" } } }, { "category": "product_version", "name": "httpd-manual-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.noarch", "product": { "name": "httpd-manual-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.noarch", "product_id": "httpd-manual-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.4.37-12.module%2Bel8.0.0%2B4096%2Beb40e6da?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.src", "product": { "name": "httpd-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.src", "product_id": "httpd-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-12.module%2Bel8.0.0%2B4096%2Beb40e6da?arch=src" } } }, { "category": "product_version", "name": "mod_http2-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.src", "product": { "name": "mod_http2-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.src", "product_id": "mod_http2-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.11.3-3.module%2Bel8.0.0%2B4096%2Beb40e6da?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "product": { "name": "httpd-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "product_id": "httpd-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-12.module%2Bel8.0.0%2B4096%2Beb40e6da?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "product": { "name": "httpd-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "product_id": "httpd-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-12.module%2Bel8.0.0%2B4096%2Beb40e6da?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "product": { "name": "httpd-debugsource-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "product_id": "httpd-debugsource-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-12.module%2Bel8.0.0%2B4096%2Beb40e6da?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "product": { "name": "httpd-devel-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "product_id": "httpd-devel-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-12.module%2Bel8.0.0%2B4096%2Beb40e6da?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "product": { "name": "httpd-tools-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "product_id": "httpd-tools-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-12.module%2Bel8.0.0%2B4096%2Beb40e6da?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "product_id": "httpd-tools-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-12.module%2Bel8.0.0%2B4096%2Beb40e6da?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.x86_64", "product": { "name": "mod_http2-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.x86_64", "product_id": "mod_http2-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.11.3-3.module%2Bel8.0.0%2B4096%2Beb40e6da?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.x86_64", "product": { "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.x86_64", "product_id": "mod_http2-debuginfo-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.11.3-3.module%2Bel8.0.0%2B4096%2Beb40e6da?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.x86_64", "product": { "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.x86_64", "product_id": "mod_http2-debugsource-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.11.3-3.module%2Bel8.0.0%2B4096%2Beb40e6da?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "product": { "name": "mod_ldap-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "product_id": "mod_ldap-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-12.module%2Bel8.0.0%2B4096%2Beb40e6da?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "product_id": "mod_ldap-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-12.module%2Bel8.0.0%2B4096%2Beb40e6da?arch=x86_64" } } }, { "category": "product_version", "name": "mod_md-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "product": { "name": "mod_md-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "product_id": "mod_md-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.4.37-12.module%2Bel8.0.0%2B4096%2Beb40e6da?arch=x86_64" } } }, { "category": "product_version", "name": "mod_md-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "product": { "name": "mod_md-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "product_id": "mod_md-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.4.37-12.module%2Bel8.0.0%2B4096%2Beb40e6da?arch=x86_64" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "product": { "name": "mod_proxy_html-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "product_id": "mod_proxy_html-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-12.module%2Bel8.0.0%2B4096%2Beb40e6da?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-12.module%2Bel8.0.0%2B4096%2Beb40e6da?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "product": { "name": "mod_session-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "product_id": "mod_session-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-12.module%2Bel8.0.0%2B4096%2Beb40e6da?arch=x86_64" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "product": { "name": "mod_session-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "product_id": "mod_session-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-12.module%2Bel8.0.0%2B4096%2Beb40e6da?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "product": { "name": "mod_ssl-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "product_id": "mod_ssl-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-12.module%2Bel8.0.0%2B4096%2Beb40e6da?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "product_id": "mod_ssl-debuginfo-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-12.module%2Bel8.0.0%2B4096%2Beb40e6da?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "product": { "name": "httpd-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "product_id": "httpd-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-12.module%2Bel8.0.0%2B4096%2Beb40e6da?arch=s390x" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "product": { "name": "httpd-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "product_id": "httpd-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-12.module%2Bel8.0.0%2B4096%2Beb40e6da?arch=s390x" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "product": { "name": "httpd-debugsource-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "product_id": "httpd-debugsource-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-12.module%2Bel8.0.0%2B4096%2Beb40e6da?arch=s390x" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "product": { "name": "httpd-devel-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "product_id": "httpd-devel-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-12.module%2Bel8.0.0%2B4096%2Beb40e6da?arch=s390x" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "product": { "name": "httpd-tools-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "product_id": "httpd-tools-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-12.module%2Bel8.0.0%2B4096%2Beb40e6da?arch=s390x" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "product_id": "httpd-tools-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-12.module%2Bel8.0.0%2B4096%2Beb40e6da?arch=s390x" } } }, { "category": "product_version", "name": "mod_http2-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.s390x", "product": { "name": "mod_http2-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.s390x", "product_id": "mod_http2-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.11.3-3.module%2Bel8.0.0%2B4096%2Beb40e6da?arch=s390x" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.s390x", "product": { "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.s390x", "product_id": "mod_http2-debuginfo-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.11.3-3.module%2Bel8.0.0%2B4096%2Beb40e6da?arch=s390x" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.s390x", "product": { "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.s390x", "product_id": "mod_http2-debugsource-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.11.3-3.module%2Bel8.0.0%2B4096%2Beb40e6da?arch=s390x" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "product": { "name": "mod_ldap-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "product_id": "mod_ldap-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-12.module%2Bel8.0.0%2B4096%2Beb40e6da?arch=s390x" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "product_id": "mod_ldap-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-12.module%2Bel8.0.0%2B4096%2Beb40e6da?arch=s390x" } } }, { "category": "product_version", "name": "mod_md-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "product": { "name": "mod_md-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "product_id": "mod_md-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.4.37-12.module%2Bel8.0.0%2B4096%2Beb40e6da?arch=s390x" } } }, { "category": "product_version", "name": "mod_md-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "product": { "name": "mod_md-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "product_id": "mod_md-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.4.37-12.module%2Bel8.0.0%2B4096%2Beb40e6da?arch=s390x" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "product": { "name": "mod_proxy_html-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "product_id": "mod_proxy_html-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-12.module%2Bel8.0.0%2B4096%2Beb40e6da?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-12.module%2Bel8.0.0%2B4096%2Beb40e6da?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "product": { "name": "mod_session-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "product_id": "mod_session-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-12.module%2Bel8.0.0%2B4096%2Beb40e6da?arch=s390x" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "product": { "name": "mod_session-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "product_id": "mod_session-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-12.module%2Bel8.0.0%2B4096%2Beb40e6da?arch=s390x" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "product": { "name": "mod_ssl-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "product_id": "mod_ssl-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-12.module%2Bel8.0.0%2B4096%2Beb40e6da?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "product_id": "mod_ssl-debuginfo-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-12.module%2Bel8.0.0%2B4096%2Beb40e6da?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "product": { "name": "httpd-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "product_id": "httpd-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-12.module%2Bel8.0.0%2B4096%2Beb40e6da?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "product": { "name": "httpd-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "product_id": "httpd-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-12.module%2Bel8.0.0%2B4096%2Beb40e6da?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "product": { "name": "httpd-debugsource-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "product_id": "httpd-debugsource-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-12.module%2Bel8.0.0%2B4096%2Beb40e6da?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "product": { "name": "httpd-devel-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "product_id": "httpd-devel-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-12.module%2Bel8.0.0%2B4096%2Beb40e6da?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "product": { "name": "httpd-tools-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "product_id": "httpd-tools-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-12.module%2Bel8.0.0%2B4096%2Beb40e6da?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "product_id": "httpd-tools-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-12.module%2Bel8.0.0%2B4096%2Beb40e6da?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.ppc64le", "product": { "name": "mod_http2-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.ppc64le", "product_id": "mod_http2-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.11.3-3.module%2Bel8.0.0%2B4096%2Beb40e6da?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.ppc64le", "product": { "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.ppc64le", "product_id": "mod_http2-debuginfo-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.11.3-3.module%2Bel8.0.0%2B4096%2Beb40e6da?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.ppc64le", "product": { "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.ppc64le", "product_id": "mod_http2-debugsource-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.11.3-3.module%2Bel8.0.0%2B4096%2Beb40e6da?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "product": { "name": "mod_ldap-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "product_id": "mod_ldap-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-12.module%2Bel8.0.0%2B4096%2Beb40e6da?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "product_id": "mod_ldap-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-12.module%2Bel8.0.0%2B4096%2Beb40e6da?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_md-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "product": { "name": "mod_md-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "product_id": "mod_md-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.4.37-12.module%2Bel8.0.0%2B4096%2Beb40e6da?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_md-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "product": { "name": "mod_md-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "product_id": "mod_md-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.4.37-12.module%2Bel8.0.0%2B4096%2Beb40e6da?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "product": { "name": "mod_proxy_html-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "product_id": "mod_proxy_html-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-12.module%2Bel8.0.0%2B4096%2Beb40e6da?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-12.module%2Bel8.0.0%2B4096%2Beb40e6da?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "product": { "name": "mod_session-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "product_id": "mod_session-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-12.module%2Bel8.0.0%2B4096%2Beb40e6da?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "product": { "name": "mod_session-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "product_id": "mod_session-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-12.module%2Bel8.0.0%2B4096%2Beb40e6da?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "product": { "name": "mod_ssl-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "product_id": "mod_ssl-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-12.module%2Bel8.0.0%2B4096%2Beb40e6da?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "product_id": "mod_ssl-debuginfo-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-12.module%2Bel8.0.0%2B4096%2Beb40e6da?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "product": { "name": "httpd-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "product_id": "httpd-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-12.module%2Bel8.0.0%2B4096%2Beb40e6da?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "product": { "name": "httpd-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "product_id": "httpd-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-12.module%2Bel8.0.0%2B4096%2Beb40e6da?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "product": { "name": "httpd-debugsource-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "product_id": "httpd-debugsource-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-12.module%2Bel8.0.0%2B4096%2Beb40e6da?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "product": { "name": "httpd-devel-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "product_id": "httpd-devel-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-12.module%2Bel8.0.0%2B4096%2Beb40e6da?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "product": { "name": "httpd-tools-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "product_id": "httpd-tools-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-12.module%2Bel8.0.0%2B4096%2Beb40e6da?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "product_id": "httpd-tools-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-12.module%2Bel8.0.0%2B4096%2Beb40e6da?arch=aarch64" } } }, { "category": "product_version", "name": "mod_http2-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.aarch64", "product": { "name": "mod_http2-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.aarch64", "product_id": "mod_http2-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.11.3-3.module%2Bel8.0.0%2B4096%2Beb40e6da?arch=aarch64" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.aarch64", "product": { "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.aarch64", "product_id": "mod_http2-debuginfo-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.11.3-3.module%2Bel8.0.0%2B4096%2Beb40e6da?arch=aarch64" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.aarch64", "product": { "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.aarch64", "product_id": "mod_http2-debugsource-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.11.3-3.module%2Bel8.0.0%2B4096%2Beb40e6da?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "product": { "name": "mod_ldap-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "product_id": "mod_ldap-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-12.module%2Bel8.0.0%2B4096%2Beb40e6da?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "product_id": "mod_ldap-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-12.module%2Bel8.0.0%2B4096%2Beb40e6da?arch=aarch64" } } }, { "category": "product_version", "name": "mod_md-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "product": { "name": "mod_md-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "product_id": "mod_md-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.4.37-12.module%2Bel8.0.0%2B4096%2Beb40e6da?arch=aarch64" } } }, { "category": "product_version", "name": "mod_md-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "product": { "name": "mod_md-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "product_id": "mod_md-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.4.37-12.module%2Bel8.0.0%2B4096%2Beb40e6da?arch=aarch64" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "product": { "name": "mod_proxy_html-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "product_id": "mod_proxy_html-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-12.module%2Bel8.0.0%2B4096%2Beb40e6da?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-12.module%2Bel8.0.0%2B4096%2Beb40e6da?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "product": { "name": "mod_session-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "product_id": "mod_session-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-12.module%2Bel8.0.0%2B4096%2Beb40e6da?arch=aarch64" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "product": { "name": "mod_session-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "product_id": "mod_session-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-12.module%2Bel8.0.0%2B4096%2Beb40e6da?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "product": { "name": "mod_ssl-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "product_id": "mod_ssl-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-12.module%2Bel8.0.0%2B4096%2Beb40e6da?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "product_id": "mod_ssl-debuginfo-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-12.module%2Bel8.0.0%2B4096%2Beb40e6da?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd:2.4:8000020190829150747:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e" }, "product_reference": "httpd:2.4:8000020190829150747:f8e95b4e", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64 as a component of httpd:2.4:8000020190829150747:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64" }, "product_reference": "httpd-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le as a component of httpd:2.4:8000020190829150747:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le" }, "product_reference": "httpd-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x as a component of httpd:2.4:8000020190829150747:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x" }, "product_reference": "httpd-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.src as a component of httpd:2.4:8000020190829150747:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.src" }, "product_reference": "httpd-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.src", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64 as a component of httpd:2.4:8000020190829150747:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64" }, "product_reference": "httpd-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64 as a component of httpd:2.4:8000020190829150747:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64" }, "product_reference": "httpd-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le as a component of httpd:2.4:8000020190829150747:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x as a component of httpd:2.4:8000020190829150747:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x" }, "product_reference": "httpd-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64 as a component of httpd:2.4:8000020190829150747:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64 as a component of httpd:2.4:8000020190829150747:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-debugsource-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64" }, "product_reference": "httpd-debugsource-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le as a component of httpd:2.4:8000020190829150747:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-debugsource-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le" }, "product_reference": "httpd-debugsource-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x as a component of httpd:2.4:8000020190829150747:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-debugsource-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x" }, "product_reference": "httpd-debugsource-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64 as a component of httpd:2.4:8000020190829150747:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-debugsource-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64" }, "product_reference": "httpd-debugsource-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64 as a component of httpd:2.4:8000020190829150747:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-devel-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64" }, "product_reference": "httpd-devel-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le as a component of httpd:2.4:8000020190829150747:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-devel-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le" }, "product_reference": "httpd-devel-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x as a component of httpd:2.4:8000020190829150747:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-devel-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x" }, "product_reference": "httpd-devel-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64 as a component of httpd:2.4:8000020190829150747:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-devel-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64" }, "product_reference": "httpd-devel-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-filesystem-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.noarch as a component of httpd:2.4:8000020190829150747:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-filesystem-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.noarch" }, "product_reference": "httpd-filesystem-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.noarch", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.noarch as a component of httpd:2.4:8000020190829150747:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-manual-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.noarch" }, "product_reference": "httpd-manual-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.noarch", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64 as a component of httpd:2.4:8000020190829150747:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-tools-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64" }, "product_reference": "httpd-tools-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le as a component of httpd:2.4:8000020190829150747:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-tools-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le" }, "product_reference": "httpd-tools-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x as a component of httpd:2.4:8000020190829150747:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-tools-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x" }, "product_reference": "httpd-tools-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64 as a component of httpd:2.4:8000020190829150747:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-tools-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64" }, "product_reference": "httpd-tools-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64 as a component of httpd:2.4:8000020190829150747:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-tools-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le as a component of httpd:2.4:8000020190829150747:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-tools-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x as a component of httpd:2.4:8000020190829150747:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-tools-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64 as a component of httpd:2.4:8000020190829150747:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-tools-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.aarch64 as a component of httpd:2.4:8000020190829150747:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_http2-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.aarch64" }, "product_reference": "mod_http2-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.ppc64le as a component of httpd:2.4:8000020190829150747:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_http2-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.ppc64le" }, "product_reference": "mod_http2-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.s390x as a component of httpd:2.4:8000020190829150747:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_http2-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.s390x" }, "product_reference": "mod_http2-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.src as a component of httpd:2.4:8000020190829150747:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_http2-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.src" }, "product_reference": "mod_http2-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.src", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.x86_64 as a component of httpd:2.4:8000020190829150747:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_http2-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.x86_64" }, "product_reference": "mod_http2-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.aarch64 as a component of httpd:2.4:8000020190829150747:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_http2-debuginfo-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.aarch64" }, "product_reference": "mod_http2-debuginfo-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.ppc64le as a component of httpd:2.4:8000020190829150747:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_http2-debuginfo-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.ppc64le" }, "product_reference": "mod_http2-debuginfo-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.s390x as a component of httpd:2.4:8000020190829150747:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_http2-debuginfo-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.s390x" }, "product_reference": "mod_http2-debuginfo-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.x86_64 as a component of httpd:2.4:8000020190829150747:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_http2-debuginfo-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.x86_64" }, "product_reference": "mod_http2-debuginfo-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.aarch64 as a component of httpd:2.4:8000020190829150747:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_http2-debugsource-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.aarch64" }, "product_reference": "mod_http2-debugsource-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.ppc64le as a component of httpd:2.4:8000020190829150747:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_http2-debugsource-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.ppc64le" }, "product_reference": "mod_http2-debugsource-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.s390x as a component of httpd:2.4:8000020190829150747:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_http2-debugsource-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.s390x" }, "product_reference": "mod_http2-debugsource-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.x86_64 as a component of httpd:2.4:8000020190829150747:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_http2-debugsource-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.x86_64" }, "product_reference": "mod_http2-debugsource-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64 as a component of httpd:2.4:8000020190829150747:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_ldap-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64" }, "product_reference": "mod_ldap-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le as a component of httpd:2.4:8000020190829150747:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_ldap-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le" }, "product_reference": "mod_ldap-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x as a component of httpd:2.4:8000020190829150747:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_ldap-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x" }, "product_reference": "mod_ldap-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64 as a component of httpd:2.4:8000020190829150747:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_ldap-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64" }, "product_reference": "mod_ldap-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64 as a component of httpd:2.4:8000020190829150747:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_ldap-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le as a component of httpd:2.4:8000020190829150747:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_ldap-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x as a component of httpd:2.4:8000020190829150747:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_ldap-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64 as a component of httpd:2.4:8000020190829150747:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_ldap-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64 as a component of httpd:2.4:8000020190829150747:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_md-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64" }, "product_reference": "mod_md-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le as a component of httpd:2.4:8000020190829150747:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_md-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le" }, "product_reference": "mod_md-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x as a component of httpd:2.4:8000020190829150747:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_md-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x" }, "product_reference": "mod_md-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64 as a component of httpd:2.4:8000020190829150747:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_md-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64" }, "product_reference": "mod_md-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64 as a component of httpd:2.4:8000020190829150747:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_md-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64" }, "product_reference": "mod_md-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le as a component of httpd:2.4:8000020190829150747:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_md-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le" }, "product_reference": "mod_md-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x as a component of httpd:2.4:8000020190829150747:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_md-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x" }, "product_reference": "mod_md-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64 as a component of httpd:2.4:8000020190829150747:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_md-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64" }, "product_reference": "mod_md-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64 as a component of httpd:2.4:8000020190829150747:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_proxy_html-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64" }, "product_reference": "mod_proxy_html-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le as a component of httpd:2.4:8000020190829150747:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_proxy_html-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x as a component of httpd:2.4:8000020190829150747:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_proxy_html-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x" }, "product_reference": "mod_proxy_html-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64 as a component of httpd:2.4:8000020190829150747:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_proxy_html-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64 as a component of httpd:2.4:8000020190829150747:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_proxy_html-debuginfo-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le as a component of httpd:2.4:8000020190829150747:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_proxy_html-debuginfo-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x as a component of httpd:2.4:8000020190829150747:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_proxy_html-debuginfo-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64 as a component of httpd:2.4:8000020190829150747:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_proxy_html-debuginfo-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64 as a component of httpd:2.4:8000020190829150747:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_session-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64" }, "product_reference": "mod_session-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le as a component of httpd:2.4:8000020190829150747:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_session-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le" }, "product_reference": "mod_session-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x as a component of httpd:2.4:8000020190829150747:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_session-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x" }, "product_reference": "mod_session-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64 as a component of httpd:2.4:8000020190829150747:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_session-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64" }, "product_reference": "mod_session-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64 as a component of httpd:2.4:8000020190829150747:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_session-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64" }, "product_reference": "mod_session-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le as a component of httpd:2.4:8000020190829150747:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_session-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le" }, "product_reference": "mod_session-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x as a component of httpd:2.4:8000020190829150747:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_session-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x" }, "product_reference": "mod_session-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64 as a component of httpd:2.4:8000020190829150747:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_session-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64" }, "product_reference": "mod_session-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64 as a component of httpd:2.4:8000020190829150747:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_ssl-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64" }, "product_reference": "mod_ssl-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le as a component of httpd:2.4:8000020190829150747:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_ssl-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le" }, "product_reference": "mod_ssl-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x as a component of httpd:2.4:8000020190829150747:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_ssl-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x" }, "product_reference": "mod_ssl-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64 as a component of httpd:2.4:8000020190829150747:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_ssl-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64" }, "product_reference": "mod_ssl-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64 as a component of httpd:2.4:8000020190829150747:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_ssl-debuginfo-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le as a component of httpd:2.4:8000020190829150747:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_ssl-debuginfo-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x as a component of httpd:2.4:8000020190829150747:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_ssl-debuginfo-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64 as a component of httpd:2.4:8000020190829150747:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_ssl-debuginfo-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-9517", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741868" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in HTTP/2. An attacker can open a HTTP/2 window so the peer can send without constraint. The TCP window remains closed so the peer cannot write the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the server\u0027s queue is setup, the responses can consume excess memory, CPU, or both, potentially leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: request for large response leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "The package httpd versions as shipped with Red Hat Enterprise Linux 5, 6 and 7 are not affected by this issue as HTTP/2 support is not provided.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.src", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-debugsource-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-debugsource-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-debugsource-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-debugsource-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-devel-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-devel-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-devel-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-devel-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-filesystem-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.noarch", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-manual-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.noarch", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-tools-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-tools-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-tools-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-tools-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-tools-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-tools-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-tools-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-tools-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_http2-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_http2-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_http2-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_http2-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.src", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_http2-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_http2-debuginfo-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_http2-debuginfo-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_http2-debuginfo-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_http2-debuginfo-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_http2-debugsource-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_http2-debugsource-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_http2-debugsource-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_http2-debugsource-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_ldap-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_ldap-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_ldap-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_ldap-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_ldap-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_ldap-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_ldap-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_ldap-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_md-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_md-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_md-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_md-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_md-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_md-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_md-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_md-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_proxy_html-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_proxy_html-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_proxy_html-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_proxy_html-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_proxy_html-debuginfo-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_proxy_html-debuginfo-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_proxy_html-debuginfo-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_proxy_html-debuginfo-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_session-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_session-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_session-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_session-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_session-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_session-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_session-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_session-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_ssl-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_ssl-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_ssl-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_ssl-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_ssl-debuginfo-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_ssl-debuginfo-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_ssl-debuginfo-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_ssl-debuginfo-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9517" }, { "category": "external", "summary": "RHBZ#1741868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741868" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9517", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9517" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9517", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9517" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-24T13:54:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.src", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-debugsource-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-debugsource-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-debugsource-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-debugsource-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-devel-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-devel-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-devel-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-devel-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-filesystem-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.noarch", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-manual-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.noarch", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-tools-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-tools-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-tools-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-tools-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-tools-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-tools-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-tools-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-tools-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_http2-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_http2-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_http2-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_http2-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.src", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_http2-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_http2-debuginfo-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_http2-debuginfo-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_http2-debuginfo-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_http2-debuginfo-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_http2-debugsource-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_http2-debugsource-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_http2-debugsource-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_http2-debugsource-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_ldap-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_ldap-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_ldap-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_ldap-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_ldap-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_ldap-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_ldap-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_ldap-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_md-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_md-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_md-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_md-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_md-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_md-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_md-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_md-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_proxy_html-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_proxy_html-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_proxy_html-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_proxy_html-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_proxy_html-debuginfo-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_proxy_html-debuginfo-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_proxy_html-debuginfo-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_proxy_html-debuginfo-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_session-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_session-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_session-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_session-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_session-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_session-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_session-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_session-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_ssl-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_ssl-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_ssl-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_ssl-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_ssl-debuginfo-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_ssl-debuginfo-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_ssl-debuginfo-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_ssl-debuginfo-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2893" }, { "category": "workaround", "details": "The httpd version shipped with Red Hat Enterprise Linux 8 provides HTTP/2 support through mod_http2 package. While mod_http2 package is not updated, users can disable HTTP/2 support as mitigation action by executing the following steps:\n\n1. Stop httpd service:\n$ systemctl stop httpd\n\n2. Remove http/2 protocol support from configuration files:\n$ sed -i \u0027s/\\(h2\\)\\|\\(h2c\\)//g\u0027 \u003chttpd_config_file\u003e\n\n3. Validate configuration files to make sure all syntax is valid:\n$ apachectl configtest\n\n4. Restart httpd service:\n$ systemctl start httpd", "product_ids": [ "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.src", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-debugsource-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-debugsource-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-debugsource-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-debugsource-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-devel-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-devel-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-devel-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-devel-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-filesystem-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.noarch", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-manual-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.noarch", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-tools-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-tools-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-tools-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-tools-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-tools-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-tools-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-tools-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-tools-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_http2-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_http2-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_http2-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_http2-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.src", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_http2-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_http2-debuginfo-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_http2-debuginfo-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_http2-debuginfo-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_http2-debuginfo-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_http2-debugsource-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_http2-debugsource-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_http2-debugsource-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_http2-debugsource-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_ldap-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_ldap-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_ldap-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_ldap-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_ldap-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_ldap-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_ldap-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_ldap-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_md-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_md-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_md-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_md-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_md-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_md-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_md-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_md-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_proxy_html-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_proxy_html-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_proxy_html-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_proxy_html-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_proxy_html-debuginfo-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_proxy_html-debuginfo-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_proxy_html-debuginfo-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_proxy_html-debuginfo-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_session-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_session-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_session-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_session-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_session-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_session-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_session-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_session-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_ssl-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_ssl-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_ssl-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_ssl-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_ssl-debuginfo-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_ssl-debuginfo-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_ssl-debuginfo-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_ssl-debuginfo-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.src", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-debugsource-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-debugsource-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-debugsource-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-debugsource-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-devel-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-devel-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-devel-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-devel-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-filesystem-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.noarch", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-manual-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.noarch", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-tools-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-tools-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-tools-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-tools-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-tools-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-tools-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-tools-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:httpd-tools-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_http2-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_http2-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_http2-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_http2-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.src", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_http2-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_http2-debuginfo-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_http2-debuginfo-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_http2-debuginfo-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_http2-debuginfo-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_http2-debugsource-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_http2-debugsource-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_http2-debugsource-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_http2-debugsource-0:1.11.3-3.module+el8.0.0+4096+eb40e6da.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_ldap-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_ldap-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_ldap-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_ldap-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_ldap-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_ldap-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_ldap-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_ldap-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_md-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_md-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_md-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_md-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_md-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_md-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_md-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_md-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_proxy_html-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_proxy_html-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_proxy_html-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_proxy_html-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_proxy_html-debuginfo-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_proxy_html-debuginfo-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_proxy_html-debuginfo-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_proxy_html-debuginfo-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_session-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_session-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_session-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_session-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_session-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_session-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_session-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_session-debuginfo-0:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_ssl-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_ssl-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_ssl-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_ssl-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_ssl-debuginfo-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_ssl-debuginfo-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_ssl-debuginfo-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190829150747:f8e95b4e:mod_ssl-debuginfo-1:2.4.37-12.module+el8.0.0+4096+eb40e6da.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: request for large response leads to denial of service" } ] }
rhsa-2019:3935
Vulnerability from csaf_redhat
Published
2019-11-20 16:08
Modified
2025-08-06 05:01
Summary
Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.37 Security Release
Notes
Topic
Red Hat JBoss Core Services Pack Apache Server 2.4.37 zip release
for RHEL 6, RHEL 7 and Microsoft Windows is available.
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
Details
Red Hat JBoss Core Services is a set of supplementary software for Red Hat JBoss middleware products. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products, and is packaged under Red Hat JBoss Core Services to allow for faster distribution of updates, and for a more consistent update experience.
This release adds the new Apache HTTP Server 2.4.37 packages that are part of the JBoss Core Services offering.
This release serves as a replacement for Red Hat JBoss Core Services Pack Apache Server 2.4.29 and includes bug fixes and enhancements. Refer to the Release Notes for information on the most significant bug fixes and enhancements included in this release.
Security Fix(es):
* openssl: RSA key generation cache timing vulnerability in crypto/rsa/rsa_gen.c allows attackers to recover private keys (CVE-2018-0737) * openssl: timing side channel attack in the DSA signature algorithm (CVE-2018-0734) * mod_auth_digest: access control bypass due to race condition (CVE-2019-0217) * openssl: Side-channel vulnerability on SMT/Hyper-Threading architectures (PortSmash) (CVE-2018-5407) * mod_session_cookie does not respect expiry time (CVE-2018-17199) * mod_http2: DoS via slow, unneeded request bodies (CVE-2018-17189) * mod_http2: possible crash on late upgrade (CVE-2019-0197) * mod_http2: read-after-free on a string compare (CVE-2019-0196) * nghttp2: HTTP/2: large amount of data request leads to denial of service (CVE-2019-9511) * nghttp2: HTTP/2: flood using PRIORITY frames resulting in excessive resource consumption (CVE-2019-9513) * mod_http2: HTTP/2: 0-length headers leads to denial of service (CVE-2019-9516) * mod_http2: HTTP/2: request for large response leads to denial of service (CVE-2019-9517)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat JBoss Core Services Pack Apache Server 2.4.37 zip release\nfor RHEL 6, RHEL 7 and Microsoft Windows is available.\n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Core Services is a set of supplementary software for Red Hat JBoss middleware products. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products, and is packaged under Red Hat JBoss Core Services to allow for faster distribution of updates, and for a more consistent update experience.\n\nThis release adds the new Apache HTTP Server 2.4.37 packages that are part of the JBoss Core Services offering.\n\nThis release serves as a replacement for Red Hat JBoss Core Services Pack Apache Server 2.4.29 and includes bug fixes and enhancements. Refer to the Release Notes for information on the most significant bug fixes and enhancements included in this release.\n\nSecurity Fix(es):\n\n* openssl: RSA key generation cache timing vulnerability in crypto/rsa/rsa_gen.c allows attackers to recover private keys (CVE-2018-0737) * openssl: timing side channel attack in the DSA signature algorithm (CVE-2018-0734) * mod_auth_digest: access control bypass due to race condition (CVE-2019-0217) * openssl: Side-channel vulnerability on SMT/Hyper-Threading architectures (PortSmash) (CVE-2018-5407) * mod_session_cookie does not respect expiry time (CVE-2018-17199) * mod_http2: DoS via slow, unneeded request bodies (CVE-2018-17189) * mod_http2: possible crash on late upgrade (CVE-2019-0197) * mod_http2: read-after-free on a string compare (CVE-2019-0196) * nghttp2: HTTP/2: large amount of data request leads to denial of service (CVE-2019-9511) * nghttp2: HTTP/2: flood using PRIORITY frames resulting in excessive resource consumption (CVE-2019-9513) * mod_http2: HTTP/2: 0-length headers leads to denial of service (CVE-2019-9516) * mod_http2: HTTP/2: request for large response leads to denial of service (CVE-2019-9517)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:3935", "url": "https://access.redhat.com/errata/RHSA-2019:3935" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1568253", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568253" }, { "category": "external", "summary": "1644364", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1644364" }, { "category": "external", "summary": "1645695", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1645695" }, { "category": "external", "summary": "1668493", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1668493" }, { "category": "external", "summary": "1668497", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1668497" }, { "category": "external", "summary": "1695020", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1695020" }, { "category": "external", "summary": "1695030", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1695030" }, { "category": "external", "summary": "1695042", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1695042" }, { "category": "external", "summary": "1735741", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735741" }, { "category": "external", "summary": "1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "1741864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741864" }, { "category": "external", "summary": "1741868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741868" }, { "category": "external", "summary": "JBCS-798", "url": "https://issues.redhat.com/browse/JBCS-798" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_3935.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.37 Security Release", "tracking": { "current_release_date": "2025-08-06T05:01:09+00:00", "generator": { "date": "2025-08-06T05:01:09+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2019:3935", "initial_release_date": "2019-11-20T16:08:18+00:00", "revision_history": [ { "date": "2019-11-20T16:08:18+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-01-06T13:01:52+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-06T05:01:09+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Text-Only JBCS", "product": { "name": "Text-Only JBCS", "product_id": "Text-Only JBCS", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_core_services:1" } } } ], "category": "product_family", "name": "Red Hat JBoss Core Services" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-0734", "cwe": { "id": "CWE-385", "name": "Covert Timing Channel" }, "discovery_date": "2018-10-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1644364" } ], "notes": [ { "category": "description", "text": "The OpenSSL DSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.1a (Affected 1.1.1). Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.0.2q (Affected 1.0.2-1.0.2p).", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: timing side channel attack in the DSA signature algorithm", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only JBCS" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-0734" }, { "category": "external", "summary": "RHBZ#1644364", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1644364" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-0734", "url": "https://www.cve.org/CVERecord?id=CVE-2018-0734" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-0734", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0734" } ], "release_date": "2018-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-20T16:08:18+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Text-Only JBCS" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3935" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "Text-Only JBCS" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "openssl: timing side channel attack in the DSA signature algorithm" }, { "cve": "CVE-2018-0737", "cwe": { "id": "CWE-385", "name": "Covert Timing Channel" }, "discovery_date": "2018-04-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1568253" } ], "notes": [ { "category": "description", "text": "OpenSSL RSA key generation was found to be vulnerable to cache side-channel attacks. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover parts of the private key.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: RSA key generation cache timing vulnerability in crypto/rsa/rsa_gen.c allows attackers to recover private keys", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only JBCS" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-0737" }, { "category": "external", "summary": "RHBZ#1568253", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568253" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-0737", "url": "https://www.cve.org/CVERecord?id=CVE-2018-0737" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-0737", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0737" }, { "category": "external", "summary": "http://www.openwall.com/lists/oss-security/2018/04/16/3", "url": "http://www.openwall.com/lists/oss-security/2018/04/16/3" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20180416.txt", "url": "https://www.openssl.org/news/secadv/20180416.txt" } ], "release_date": "2018-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-20T16:08:18+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Text-Only JBCS" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3935" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "Text-Only JBCS" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "openssl: RSA key generation cache timing vulnerability in crypto/rsa/rsa_gen.c allows attackers to recover private keys" }, { "acknowledgments": [ { "names": [ "Alejandro Cabrera Aldaya" ], "organization": "Universidad Tecnologica de la Habana CUJAE; Cuba" }, { "names": [ "Billy Bob Brumley", "Cesar Pereida Garcia", "Sohaib ul Hassan" ] }, { "names": [ "Nicola Tuveri" ], "organization": "Tampere University of Technology; Finland" } ], "cve": "CVE-2018-5407", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-11-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1645695" } ], "notes": [ { "category": "description", "text": "A microprocessor side-channel vulnerability was found on SMT (e.g, Hyper-Threading) architectures. An attacker running a malicious process on the same core of the processor as the victim process can extract certain secret information.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Side-channel vulnerability on SMT/Hyper-Threading architectures (PortSmash)", "title": "Vulnerability summary" }, { "category": "other", "text": "This is a timing side-channel flaw on processors which implement SMT/Hyper-Threading architectures. It can result in leakage of secret data in applications such as OpenSSL that has secret dependent control flow at any granularity level. In order to exploit this flaw, the attacker needs to run a malicious process on the same core of the processor as the victim process.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only JBCS" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-5407" }, { "category": "external", "summary": "RHBZ#1645695", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1645695" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-5407", "url": "https://www.cve.org/CVERecord?id=CVE-2018-5407" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-5407", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-5407" }, { "category": "external", "summary": "https://github.com/bbbrumley/portsmash", "url": "https://github.com/bbbrumley/portsmash" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20181112.txt", "url": "https://www.openssl.org/news/secadv/20181112.txt" } ], "release_date": "2018-10-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-20T16:08:18+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Text-Only JBCS" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3935" }, { "category": "workaround", "details": "At this time Red Hat Engineering is working on patches for openssl package in Red Hat Enterprise Linux 7 to address this issue. Until fixes are available, users are advised to review the guidance supplied in the L1 Terminal Fault vulnerability article: https://access.redhat.com/security/vulnerabilities/L1TF and decide what their exposure across shared CPU threads are and act accordingly.", "product_ids": [ "Text-Only JBCS" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "Text-Only JBCS" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: Side-channel vulnerability on SMT/Hyper-Threading architectures (PortSmash)" }, { "cve": "CVE-2018-17189", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-01-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1668497" } ], "notes": [ { "category": "description", "text": "In Apache HTTP server versions 2.4.37 and prior, by sending request bodies in a slow loris way to plain resources, the h2 stream for that request unnecessarily occupied a server thread cleaning up that incoming data. This affects only HTTP/2 (mod_http2) connections.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_http2: DoS via slow, unneeded request bodies", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only JBCS" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-17189" }, { "category": "external", "summary": "RHBZ#1668497", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1668497" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-17189", "url": "https://www.cve.org/CVERecord?id=CVE-2018-17189" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-17189", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-17189" } ], "release_date": "2019-01-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-20T16:08:18+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Text-Only JBCS" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3935" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "Text-Only JBCS" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "httpd: mod_http2: DoS via slow, unneeded request bodies" }, { "cve": "CVE-2018-17199", "cwe": { "id": "CWE-613", "name": "Insufficient Session Expiration" }, "discovery_date": "2019-01-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1668493" } ], "notes": [ { "category": "description", "text": "In Apache HTTP Server 2.4 release 2.4.37 and prior, mod_session checks the session expiry time before decoding the session. This causes session expiry time to be ignored for mod_session_cookie sessions since the expiry time is loaded when the session is decoded.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_session_cookie does not respect expiry time", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only JBCS" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-17199" }, { "category": "external", "summary": "RHBZ#1668493", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1668493" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-17199", "url": "https://www.cve.org/CVERecord?id=CVE-2018-17199" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-17199", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-17199" } ], "release_date": "2019-01-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-20T16:08:18+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Text-Only JBCS" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3935" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "Text-Only JBCS" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: mod_session_cookie does not respect expiry time" }, { "cve": "CVE-2019-0196", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2019-04-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1695030" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Apache HTTP Server 2.4.17 to 2.4.38. Using fuzzed network input, the http/2 request handling could be made to access freed memory in string comparison when determining the method of a request and thus process the request incorrectly.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_http2: read-after-free on a string compare", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only JBCS" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-0196" }, { "category": "external", "summary": "RHBZ#1695030", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1695030" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-0196", "url": "https://www.cve.org/CVERecord?id=CVE-2019-0196" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0196", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0196" }, { "category": "external", "summary": "http://www.apache.org/dist/httpd/CHANGES_2.4", "url": "http://www.apache.org/dist/httpd/CHANGES_2.4" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html", "url": "https://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2019-04-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-20T16:08:18+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Text-Only JBCS" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3935" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "Text-Only JBCS" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "httpd: mod_http2: read-after-free on a string compare" }, { "cve": "CVE-2019-0197", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2019-04-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1695042" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Apache HTTP Server 2.4.34 to 2.4.38. When HTTP/2 was enabled for a http: host or H2Upgrade was enabled for h2 on a https: host, an Upgrade request from http/1.1 to http/2 that was not the first request on a connection could lead to a misconfiguration and crash. Server that never enabled the h2 protocol or that only enabled it for https: and did not set \"H2Upgrade on\" are unaffected by this issue.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_http2: possible crash on late upgrade", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only JBCS" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-0197" }, { "category": "external", "summary": "RHBZ#1695042", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1695042" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-0197", "url": "https://www.cve.org/CVERecord?id=CVE-2019-0197" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0197", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0197" }, { "category": "external", "summary": "http://www.apache.org/dist/httpd/CHANGES_2.4", "url": "http://www.apache.org/dist/httpd/CHANGES_2.4" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html", "url": "https://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2019-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-20T16:08:18+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Text-Only JBCS" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3935" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "Text-Only JBCS" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "httpd: mod_http2: possible crash on late upgrade" }, { "cve": "CVE-2019-0217", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2019-04-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1695020" } ], "notes": [ { "category": "description", "text": "A race condition was found in mod_auth_digest when the web server was running in a threaded MPM configuration. It could allow a user with valid credentials to authenticate using another username, bypassing configured access control restrictions.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_auth_digest: access control bypass due to race condition", "title": "Vulnerability summary" }, { "category": "other", "text": "Based on the the fact that digest authentication is rarely used in modern day web applications and httpd package shipped with Red Hat products do not ship threaded MPM configuration by default, this flaw has been rated as having Moderate level security impact. Red Hat Enterprise Linux 6 is now in Maintenance Support 2 Phase of the support and maintenance life cycle. This flaw has been rated as having a security impact of Moderate, and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only JBCS" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-0217" }, { "category": "external", "summary": "RHBZ#1695020", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1695020" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-0217", "url": "https://www.cve.org/CVERecord?id=CVE-2019-0217" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0217", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0217" }, { "category": "external", "summary": "http://www.apache.org/dist/httpd/CHANGES_2.4", "url": "http://www.apache.org/dist/httpd/CHANGES_2.4" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html", "url": "https://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2019-04-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-20T16:08:18+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Text-Only JBCS" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3935" }, { "category": "workaround", "details": "This flaw only affects a threaded server configuration, so using the prefork MPM is an effective mitigation. In versions of httpd package shipped with Red Hat Enterprise Linux 7, the prefork MPM is the default configuration.", "product_ids": [ "Text-Only JBCS" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "Text-Only JBCS" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: mod_auth_digest: access control bypass due to race condition" }, { "cve": "CVE-2019-9511", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741860" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker can request a large amount of data by manipulating window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this queue can consume excess CPU, memory, or both, leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: large amount of data requests leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "There are no mitigations available for nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only JBCS" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9511" }, { "category": "external", "summary": "RHBZ#1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9511", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9511" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-20T16:08:18+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Text-Only JBCS" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3935" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "Text-Only JBCS" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Text-Only JBCS" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: large amount of data requests leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9513", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735741" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker, using PRIORITY frames to flood the system, could cause excessive CPU usage and starvation of other clients. The largest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PRIORITY frames results in excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for packages nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only JBCS" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9513" }, { "category": "external", "summary": "RHBZ#1735741", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735741" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9513", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9513" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9513", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9513" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nghttp2.org/blog/2019/08/19/nghttp2-v1-39-2/", "url": "https://nghttp2.org/blog/2019/08/19/nghttp2-v1-39-2/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-20T16:08:18+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Text-Only JBCS" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3935" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "Text-Only JBCS" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Text-Only JBCS" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PRIORITY frames results in excessive resource consumption" }, { "cve": "CVE-2019-9516", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741864" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker, sending a stream of header with a 0-length header name and a 0-length header value, could cause some implementations to allocate memory for these headers and keep the allocations alive until the session dies. The can consume excess memory, potentially leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: 0-length headers lead to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only JBCS" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9516" }, { "category": "external", "summary": "RHBZ#1741864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741864" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9516", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9516" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9516", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9516" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://github.com/nghttp2/nghttp2/issues/1382#", "url": "https://github.com/nghttp2/nghttp2/issues/1382#" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-20T16:08:18+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Text-Only JBCS" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3935" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "Text-Only JBCS" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Text-Only JBCS" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: 0-length headers lead to denial of service" }, { "cve": "CVE-2019-9517", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741868" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in HTTP/2. An attacker can open a HTTP/2 window so the peer can send without constraint. The TCP window remains closed so the peer cannot write the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the server\u0027s queue is setup, the responses can consume excess memory, CPU, or both, potentially leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: request for large response leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "The package httpd versions as shipped with Red Hat Enterprise Linux 5, 6 and 7 are not affected by this issue as HTTP/2 support is not provided.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only JBCS" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9517" }, { "category": "external", "summary": "RHBZ#1741868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741868" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9517", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9517" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9517", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9517" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-20T16:08:18+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Text-Only JBCS" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3935" }, { "category": "workaround", "details": "The httpd version shipped with Red Hat Enterprise Linux 8 provides HTTP/2 support through mod_http2 package. While mod_http2 package is not updated, users can disable HTTP/2 support as mitigation action by executing the following steps:\n\n1. Stop httpd service:\n$ systemctl stop httpd\n\n2. Remove http/2 protocol support from configuration files:\n$ sed -i \u0027s/\\(h2\\)\\|\\(h2c\\)//g\u0027 \u003chttpd_config_file\u003e\n\n3. Validate configuration files to make sure all syntax is valid:\n$ apachectl configtest\n\n4. Restart httpd service:\n$ systemctl start httpd", "product_ids": [ "Text-Only JBCS" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Text-Only JBCS" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: request for large response leads to denial of service" } ] }
rhsa-2019:3932
Vulnerability from csaf_redhat
Published
2019-11-20 16:22
Modified
2025-08-06 05:01
Summary
Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.37 Security Release on RHEL 6
Notes
Topic
Updated packages that provide Red Hat JBoss Core Services Pack Apache Server 2.4.37 and fix several bugs, and add various enhancements are now available for Red Hat Enterprise Linux 6.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
This release adds the new Apache HTTP Server 2.4.37 packages that are part of the JBoss Core Services offering.
This release serves as a replacement for Red Hat JBoss Core Services Pack Apache Server 2.4.29 and includes bug fixes and enhancements. Refer to the Release Notes for information on the most significant bug fixes and enhancements included in this release.
Security Fix(es):
* openssl: RSA key generation cache timing vulnerability in crypto/rsa/rsa_gen.c allows attackers to recover private keys (CVE-2018-0737) * openssl: timing side channel attack in the DSA signature algorithm (CVE-2018-0734) * mod_auth_digest: access control bypass due to race condition (CVE-2019-0217) * openssl: Side-channel vulnerability on SMT/Hyper-Threading architectures (PortSmash) (CVE-2018-5407) * mod_session_cookie does not respect expiry time (CVE-2018-17199) * mod_http2: DoS via slow, unneeded request bodies (CVE-2018-17189) * mod_http2: possible crash on late upgrade (CVE-2019-0197) * mod_http2: read-after-free on a string compare (CVE-2019-0196) * nghttp2: HTTP/2: large amount of data request leads to denial of service (CVE-2019-9511) * nghttp2: HTTP/2: flood using PRIORITY frames resulting in excessive resource consumption (CVE-2019-9513) * mod_http2: HTTP/2: 0-length headers leads to denial of service (CVE-2019-9516) * mod_http2: HTTP/2: request for large response leads to denial of service (CVE-2019-9517)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated packages that provide Red Hat JBoss Core Services Pack Apache Server 2.4.37 and fix several bugs, and add various enhancements are now available for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "This release adds the new Apache HTTP Server 2.4.37 packages that are part of the JBoss Core Services offering.\n\nThis release serves as a replacement for Red Hat JBoss Core Services Pack Apache Server 2.4.29 and includes bug fixes and enhancements. Refer to the Release Notes for information on the most significant bug fixes and enhancements included in this release.\n\nSecurity Fix(es):\n\n* openssl: RSA key generation cache timing vulnerability in crypto/rsa/rsa_gen.c allows attackers to recover private keys (CVE-2018-0737) * openssl: timing side channel attack in the DSA signature algorithm (CVE-2018-0734) * mod_auth_digest: access control bypass due to race condition (CVE-2019-0217) * openssl: Side-channel vulnerability on SMT/Hyper-Threading architectures (PortSmash) (CVE-2018-5407) * mod_session_cookie does not respect expiry time (CVE-2018-17199) * mod_http2: DoS via slow, unneeded request bodies (CVE-2018-17189) * mod_http2: possible crash on late upgrade (CVE-2019-0197) * mod_http2: read-after-free on a string compare (CVE-2019-0196) * nghttp2: HTTP/2: large amount of data request leads to denial of service (CVE-2019-9511) * nghttp2: HTTP/2: flood using PRIORITY frames resulting in excessive resource consumption (CVE-2019-9513) * mod_http2: HTTP/2: 0-length headers leads to denial of service (CVE-2019-9516) * mod_http2: HTTP/2: request for large response leads to denial of service (CVE-2019-9517)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:3932", "url": "https://access.redhat.com/errata/RHSA-2019:3932" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1568253", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568253" }, { "category": "external", "summary": "1644364", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1644364" }, { "category": "external", "summary": "1645695", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1645695" }, { "category": "external", "summary": "1668493", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1668493" }, { "category": "external", "summary": "1668497", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1668497" }, { "category": "external", "summary": "1695020", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1695020" }, { "category": "external", "summary": "1695030", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1695030" }, { "category": "external", "summary": "1695042", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1695042" }, { "category": "external", "summary": "1735741", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735741" }, { "category": "external", "summary": "1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "1741864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741864" }, { "category": "external", "summary": "1741868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741868" }, { "category": "external", "summary": "JBCS-798", "url": "https://issues.redhat.com/browse/JBCS-798" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_3932.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.37 Security Release on RHEL 6", "tracking": { "current_release_date": "2025-08-06T05:01:23+00:00", "generator": { "date": "2025-08-06T05:01:23+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2019:3932", "initial_release_date": "2019-11-20T16:22:09+00:00", "revision_history": [ { "date": "2019-11-20T16:22:09+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-01-06T13:05:52+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-06T05:01:23+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Core Services on RHEL 6 Server", "product": { "name": "Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_core_services:1::el6" } } } ], "category": "product_family", "name": "Red Hat JBoss Core Services" }, { "branches": [ { "category": "product_version", "name": "jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.i686", "product_id": "jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-jansson@2.11-20.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.i686", "product_id": "jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-jansson-devel@2.11-20.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.i686", "product_id": "jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-jansson-debuginfo@2.11-20.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.i686", "product_id": "jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr@1.6.3-63.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.i686", "product_id": "jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-devel@1.6.3-63.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.i686", "product_id": "jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-debuginfo@1.6.3-63.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.i686", "product_id": "jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.1.1-25.jbcs.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.i686", "product_id": "jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-devel@1.1.1-25.jbcs.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.i686", "product_id": "jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-libs@1.1.1-25.jbcs.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.i686", "product_id": "jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-perl@1.1.1-25.jbcs.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.i686", "product_id": "jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-static@1.1.1-25.jbcs.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.i686", "product_id": "jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-debuginfo@1.1.1-25.jbcs.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.i686", "product_id": "jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util@1.6.1-48.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.i686", "product_id": "jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-devel@1.6.1-48.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.i686", "product_id": "jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-ldap@1.6.1-48.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.i686", "product_id": "jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-mysql@1.6.1-48.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.i686", "product_id": "jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-nss@1.6.1-48.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.i686", "product_id": "jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-odbc@1.6.1-48.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.i686", "product_id": "jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-openssl@1.6.1-48.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.i686", "product_id": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-pgsql@1.6.1-48.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.i686", "product_id": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-sqlite@1.6.1-48.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.i686", "product_id": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-debuginfo@1.6.1-48.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.i686", "product_id": "jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-brotli@1.0.6-7.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.i686", "product_id": "jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-brotli-devel@1.0.6-7.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.i686", "product_id": "jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-brotli-debuginfo@1.0.6-7.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.i686", "product_id": "jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2@1.39.2-4.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.i686", "product_id": "jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2-devel@1.39.2-4.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.i686", "product_id": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2-debuginfo@1.39.2-4.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.i686", "product_id": "jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-curl@7.64.1-14.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.i686", "product_id": "jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-libcurl@7.64.1-14.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.i686", "product_id": "jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-libcurl-devel@7.64.1-14.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.i686", "product_id": "jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-curl-debuginfo@7.64.1-14.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.i686", "product_id": "jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.37-33.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.i686", "product_id": "jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-devel@2.4.37-33.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.i686", "product_id": "jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-selinux@2.4.37-33.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.i686", "product_id": "jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-tools@2.4.37-33.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ldap@2.4.37-33.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md@2.4.37-33.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html@2.4.37-33.jbcs.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_session@2.4.37-33.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ssl@2.4.37-33.jbcs.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.i686", "product_id": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-debuginfo@2.4.37-33.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native@1.3.12-9.Final_redhat_2.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native-debuginfo@1.3.12-9.Final_redhat_2.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-ap24@1.2.46-22.redhat_1.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-manual@1.2.46-22.redhat_1.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-debuginfo@1.2.46-22.redhat_1.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.2-16.GA.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security-debuginfo@2.9.2-16.GA.jbcs.el6?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-jansson@2.11-20.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-jansson-devel@2.11-20.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-jansson-debuginfo@2.11-20.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr@1.6.3-63.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-devel@1.6.3-63.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-debuginfo@1.6.3-63.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.1.1-25.jbcs.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-devel@1.1.1-25.jbcs.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-libs@1.1.1-25.jbcs.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-perl@1.1.1-25.jbcs.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-static@1.1.1-25.jbcs.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-debuginfo@1.1.1-25.jbcs.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util@1.6.1-48.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-devel@1.6.1-48.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-ldap@1.6.1-48.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-mysql@1.6.1-48.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-nss@1.6.1-48.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-odbc@1.6.1-48.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-openssl@1.6.1-48.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-pgsql@1.6.1-48.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-sqlite@1.6.1-48.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-debuginfo@1.6.1-48.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-brotli@1.0.6-7.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-brotli-devel@1.0.6-7.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-brotli-debuginfo@1.0.6-7.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2@1.39.2-4.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2-devel@1.39.2-4.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2-debuginfo@1.39.2-4.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-curl@7.64.1-14.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-libcurl@7.64.1-14.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-libcurl-devel@7.64.1-14.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-curl-debuginfo@7.64.1-14.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.37-33.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-devel@2.4.37-33.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-selinux@2.4.37-33.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-tools@2.4.37-33.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ldap@2.4.37-33.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md@2.4.37-33.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html@2.4.37-33.jbcs.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_session@2.4.37-33.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ssl@2.4.37-33.jbcs.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-debuginfo@2.4.37-33.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native@1.3.12-9.Final_redhat_2.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native-debuginfo@1.3.12-9.Final_redhat_2.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-ap24@1.2.46-22.redhat_1.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-manual@1.2.46-22.redhat_1.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-debuginfo@1.2.46-22.redhat_1.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.2-16.GA.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security-debuginfo@2.9.2-16.GA.jbcs.el6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.src", "product": { "name": "jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.src", "product_id": "jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-jansson@2.11-20.jbcs.el6?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.src", "product": { "name": "jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.src", "product_id": "jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr@1.6.3-63.jbcs.el6?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.src", "product": { "name": "jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.src", "product_id": "jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.1.1-25.jbcs.el6?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.src", "product": { "name": "jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.src", "product_id": "jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util@1.6.1-48.jbcs.el6?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.src", "product": { "name": "jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.src", "product_id": "jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-brotli@1.0.6-7.jbcs.el6?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.src", "product": { "name": "jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.src", "product_id": "jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2@1.39.2-4.jbcs.el6?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.src", "product": { "name": "jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.src", "product_id": "jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-curl@7.64.1-14.jbcs.el6?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.src", "product": { "name": "jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.src", "product_id": "jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.37-33.jbcs.el6?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.src", "product": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.src", "product_id": "jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native@1.3.12-9.Final_redhat_2.jbcs.el6?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el6.src", "product": { "name": "jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el6.src", "product_id": "jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk@1.2.46-22.redhat_1.jbcs.el6?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.src", "product": { "name": "jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.src", "product_id": "jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.2-16.GA.jbcs.el6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el6.noarch", "product": { "name": "jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el6.noarch", "product_id": "jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-manual@2.4.37-33.jbcs.el6?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.src as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.src" }, "product_reference": "jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.src", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.src as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.src" }, "product_reference": "jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.src", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.src as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.src" }, "product_reference": "jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.src", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.src as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.src" }, "product_reference": "jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.src", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.src as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.src" }, "product_reference": "jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.src", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el6.noarch as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el6.noarch" }, "product_reference": "jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el6.noarch", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.src as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.src" }, "product_reference": "jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.src", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.src as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.src" }, "product_reference": "jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.src", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el6.src as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el6.src" }, "product_reference": "jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el6.src", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.src as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.src" }, "product_reference": "jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.src", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.src as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.src" }, "product_reference": "jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.src", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.src as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.src" }, "product_reference": "jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.src", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-0734", "cwe": { "id": "CWE-385", "name": "Covert Timing Channel" }, "discovery_date": "2018-10-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1644364" } ], "notes": [ { "category": "description", "text": "The OpenSSL DSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.1a (Affected 1.1.1). Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.0.2q (Affected 1.0.2-1.0.2p).", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: timing side channel attack in the DSA signature algorithm", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-0734" }, { "category": "external", "summary": "RHBZ#1644364", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1644364" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-0734", "url": "https://www.cve.org/CVERecord?id=CVE-2018-0734" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-0734", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0734" } ], "release_date": "2018-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-20T16:22:09+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. After installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3932" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "openssl: timing side channel attack in the DSA signature algorithm" }, { "cve": "CVE-2018-0737", "cwe": { "id": "CWE-385", "name": "Covert Timing Channel" }, "discovery_date": "2018-04-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1568253" } ], "notes": [ { "category": "description", "text": "OpenSSL RSA key generation was found to be vulnerable to cache side-channel attacks. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover parts of the private key.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: RSA key generation cache timing vulnerability in crypto/rsa/rsa_gen.c allows attackers to recover private keys", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-0737" }, { "category": "external", "summary": "RHBZ#1568253", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568253" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-0737", "url": "https://www.cve.org/CVERecord?id=CVE-2018-0737" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-0737", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0737" }, { "category": "external", "summary": "http://www.openwall.com/lists/oss-security/2018/04/16/3", "url": "http://www.openwall.com/lists/oss-security/2018/04/16/3" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20180416.txt", "url": "https://www.openssl.org/news/secadv/20180416.txt" } ], "release_date": "2018-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-20T16:22:09+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. After installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3932" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "openssl: RSA key generation cache timing vulnerability in crypto/rsa/rsa_gen.c allows attackers to recover private keys" }, { "acknowledgments": [ { "names": [ "Alejandro Cabrera Aldaya" ], "organization": "Universidad Tecnologica de la Habana CUJAE; Cuba" }, { "names": [ "Billy Bob Brumley", "Cesar Pereida Garcia", "Sohaib ul Hassan" ] }, { "names": [ "Nicola Tuveri" ], "organization": "Tampere University of Technology; Finland" } ], "cve": "CVE-2018-5407", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-11-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1645695" } ], "notes": [ { "category": "description", "text": "A microprocessor side-channel vulnerability was found on SMT (e.g, Hyper-Threading) architectures. An attacker running a malicious process on the same core of the processor as the victim process can extract certain secret information.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Side-channel vulnerability on SMT/Hyper-Threading architectures (PortSmash)", "title": "Vulnerability summary" }, { "category": "other", "text": "This is a timing side-channel flaw on processors which implement SMT/Hyper-Threading architectures. It can result in leakage of secret data in applications such as OpenSSL that has secret dependent control flow at any granularity level. In order to exploit this flaw, the attacker needs to run a malicious process on the same core of the processor as the victim process.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-5407" }, { "category": "external", "summary": "RHBZ#1645695", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1645695" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-5407", "url": "https://www.cve.org/CVERecord?id=CVE-2018-5407" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-5407", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-5407" }, { "category": "external", "summary": "https://github.com/bbbrumley/portsmash", "url": "https://github.com/bbbrumley/portsmash" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20181112.txt", "url": "https://www.openssl.org/news/secadv/20181112.txt" } ], "release_date": "2018-10-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-20T16:22:09+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. After installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3932" }, { "category": "workaround", "details": "At this time Red Hat Engineering is working on patches for openssl package in Red Hat Enterprise Linux 7 to address this issue. Until fixes are available, users are advised to review the guidance supplied in the L1 Terminal Fault vulnerability article: https://access.redhat.com/security/vulnerabilities/L1TF and decide what their exposure across shared CPU threads are and act accordingly.", "product_ids": [ "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: Side-channel vulnerability on SMT/Hyper-Threading architectures (PortSmash)" }, { "cve": "CVE-2018-17189", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-01-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1668497" } ], "notes": [ { "category": "description", "text": "In Apache HTTP server versions 2.4.37 and prior, by sending request bodies in a slow loris way to plain resources, the h2 stream for that request unnecessarily occupied a server thread cleaning up that incoming data. This affects only HTTP/2 (mod_http2) connections.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_http2: DoS via slow, unneeded request bodies", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-17189" }, { "category": "external", "summary": "RHBZ#1668497", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1668497" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-17189", "url": "https://www.cve.org/CVERecord?id=CVE-2018-17189" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-17189", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-17189" } ], "release_date": "2019-01-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-20T16:22:09+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. After installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3932" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "httpd: mod_http2: DoS via slow, unneeded request bodies" }, { "cve": "CVE-2018-17199", "cwe": { "id": "CWE-613", "name": "Insufficient Session Expiration" }, "discovery_date": "2019-01-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1668493" } ], "notes": [ { "category": "description", "text": "In Apache HTTP Server 2.4 release 2.4.37 and prior, mod_session checks the session expiry time before decoding the session. This causes session expiry time to be ignored for mod_session_cookie sessions since the expiry time is loaded when the session is decoded.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_session_cookie does not respect expiry time", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-17199" }, { "category": "external", "summary": "RHBZ#1668493", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1668493" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-17199", "url": "https://www.cve.org/CVERecord?id=CVE-2018-17199" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-17199", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-17199" } ], "release_date": "2019-01-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-20T16:22:09+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. After installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3932" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: mod_session_cookie does not respect expiry time" }, { "cve": "CVE-2019-0196", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2019-04-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1695030" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Apache HTTP Server 2.4.17 to 2.4.38. Using fuzzed network input, the http/2 request handling could be made to access freed memory in string comparison when determining the method of a request and thus process the request incorrectly.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_http2: read-after-free on a string compare", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-0196" }, { "category": "external", "summary": "RHBZ#1695030", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1695030" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-0196", "url": "https://www.cve.org/CVERecord?id=CVE-2019-0196" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0196", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0196" }, { "category": "external", "summary": "http://www.apache.org/dist/httpd/CHANGES_2.4", "url": "http://www.apache.org/dist/httpd/CHANGES_2.4" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html", "url": "https://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2019-04-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-20T16:22:09+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. After installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3932" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "httpd: mod_http2: read-after-free on a string compare" }, { "cve": "CVE-2019-0197", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2019-04-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1695042" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Apache HTTP Server 2.4.34 to 2.4.38. When HTTP/2 was enabled for a http: host or H2Upgrade was enabled for h2 on a https: host, an Upgrade request from http/1.1 to http/2 that was not the first request on a connection could lead to a misconfiguration and crash. Server that never enabled the h2 protocol or that only enabled it for https: and did not set \"H2Upgrade on\" are unaffected by this issue.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_http2: possible crash on late upgrade", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-0197" }, { "category": "external", "summary": "RHBZ#1695042", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1695042" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-0197", "url": "https://www.cve.org/CVERecord?id=CVE-2019-0197" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0197", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0197" }, { "category": "external", "summary": "http://www.apache.org/dist/httpd/CHANGES_2.4", "url": "http://www.apache.org/dist/httpd/CHANGES_2.4" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html", "url": "https://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2019-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-20T16:22:09+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. After installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3932" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "httpd: mod_http2: possible crash on late upgrade" }, { "cve": "CVE-2019-0217", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2019-04-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1695020" } ], "notes": [ { "category": "description", "text": "A race condition was found in mod_auth_digest when the web server was running in a threaded MPM configuration. It could allow a user with valid credentials to authenticate using another username, bypassing configured access control restrictions.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_auth_digest: access control bypass due to race condition", "title": "Vulnerability summary" }, { "category": "other", "text": "Based on the the fact that digest authentication is rarely used in modern day web applications and httpd package shipped with Red Hat products do not ship threaded MPM configuration by default, this flaw has been rated as having Moderate level security impact. Red Hat Enterprise Linux 6 is now in Maintenance Support 2 Phase of the support and maintenance life cycle. This flaw has been rated as having a security impact of Moderate, and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-0217" }, { "category": "external", "summary": "RHBZ#1695020", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1695020" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-0217", "url": "https://www.cve.org/CVERecord?id=CVE-2019-0217" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0217", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0217" }, { "category": "external", "summary": "http://www.apache.org/dist/httpd/CHANGES_2.4", "url": "http://www.apache.org/dist/httpd/CHANGES_2.4" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html", "url": "https://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2019-04-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-20T16:22:09+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. After installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3932" }, { "category": "workaround", "details": "This flaw only affects a threaded server configuration, so using the prefork MPM is an effective mitigation. In versions of httpd package shipped with Red Hat Enterprise Linux 7, the prefork MPM is the default configuration.", "product_ids": [ "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: mod_auth_digest: access control bypass due to race condition" }, { "cve": "CVE-2019-9511", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741860" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker can request a large amount of data by manipulating window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this queue can consume excess CPU, memory, or both, leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: large amount of data requests leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "There are no mitigations available for nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9511" }, { "category": "external", "summary": "RHBZ#1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9511", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9511" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-20T16:22:09+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. After installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3932" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: large amount of data requests leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9513", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735741" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker, using PRIORITY frames to flood the system, could cause excessive CPU usage and starvation of other clients. The largest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PRIORITY frames results in excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for packages nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9513" }, { "category": "external", "summary": "RHBZ#1735741", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735741" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9513", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9513" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9513", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9513" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nghttp2.org/blog/2019/08/19/nghttp2-v1-39-2/", "url": "https://nghttp2.org/blog/2019/08/19/nghttp2-v1-39-2/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-20T16:22:09+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. After installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3932" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PRIORITY frames results in excessive resource consumption" }, { "cve": "CVE-2019-9516", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741864" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker, sending a stream of header with a 0-length header name and a 0-length header value, could cause some implementations to allocate memory for these headers and keep the allocations alive until the session dies. The can consume excess memory, potentially leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: 0-length headers lead to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9516" }, { "category": "external", "summary": "RHBZ#1741864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741864" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9516", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9516" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9516", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9516" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://github.com/nghttp2/nghttp2/issues/1382#", "url": "https://github.com/nghttp2/nghttp2/issues/1382#" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-20T16:22:09+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. After installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3932" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: 0-length headers lead to denial of service" }, { "cve": "CVE-2019-9517", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741868" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in HTTP/2. An attacker can open a HTTP/2 window so the peer can send without constraint. The TCP window remains closed so the peer cannot write the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the server\u0027s queue is setup, the responses can consume excess memory, CPU, or both, potentially leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: request for large response leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "The package httpd versions as shipped with Red Hat Enterprise Linux 5, 6 and 7 are not affected by this issue as HTTP/2 support is not provided.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9517" }, { "category": "external", "summary": "RHBZ#1741868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741868" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9517", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9517" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9517", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9517" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-20T16:22:09+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. After installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3932" }, { "category": "workaround", "details": "The httpd version shipped with Red Hat Enterprise Linux 8 provides HTTP/2 support through mod_http2 package. While mod_http2 package is not updated, users can disable HTTP/2 support as mitigation action by executing the following steps:\n\n1. Stop httpd service:\n$ systemctl stop httpd\n\n2. Remove http/2 protocol support from configuration files:\n$ sed -i \u0027s/\\(h2\\)\\|\\(h2c\\)//g\u0027 \u003chttpd_config_file\u003e\n\n3. Validate configuration files to make sure all syntax is valid:\n$ apachectl configtest\n\n4. Restart httpd service:\n$ systemctl start httpd", "product_ids": [ "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: request for large response leads to denial of service" } ] }
rhsa-2020:0983
Vulnerability from csaf_redhat
Published
2020-03-26 15:46
Modified
2025-08-07 12:28
Summary
Red Hat Security Advisory: Red Hat Fuse 7.6.0 security update
Notes
Topic
A minor version update (from 7.5 to 7.6) is now available for Red Hat Fuse. The purpose of this text-only errata is to inform you about the security issues fixed in this release.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
[2020-04-17 update: descriptions for mutiple components fixed for the same CVE added; also added golang CVE descriptions that were unintentionally ommitted from the original publication]
Details
This release of Red Hat Fuse 7.6.0 serves as a replacement for Red Hat Fuse 7.5, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.
Security Fix(es):
* undertow: HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)
* golang: HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)
* undertow: HTTP/2: flood using PRIORITY frames results in excessive resource consumption (CVE-2019-9513)
* undertow: HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)
* golang: HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)
* undertow: HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)
* undertow: HTTP/2: 0-length headers lead to denial of service (CVE-2019-9516)
* undertow: HTTP/2: request for large response leads to denial of service (CVE-2019-9517)
* undertow: HTTP/2: flood using empty frames results in excessive resource consumption (CVE-2019-9518)
* infinispan: invokeAccessibly method from ReflectionUtil class allows to invoke private methods (CVE-2019-10174)
* spring-security-core: mishandling of user passwords allows logging in with a password of NULL (CVE-2019-11272)
* jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution (CVE-2019-12384)
* jackson-databind: default typing mishandling leading to remote code execution (CVE-2019-14379)
* xmlrpc: Deserialization of server-side exception from faultCause in XMLRPC error response (CVE-2019-17570)
* js-jquery: Cross-site scripting via cross-domain ajax requests (CVE-2015-9251)
* logback: Serialization vulnerability in SocketServer and ServerSocketReceiver (CVE-2017-5929)
* js-jquery: XSS in responses from cross-origin ajax requests (CVE-2017-16012)
* apache-commons-compress: ZipArchiveInputStream.read() fails to identify correct EOF allowing for DoS via crafted zip (CVE-2018-11771)
* spring-data-api: potential information disclosure through maliciously crafted example value in ExampleMatcher (CVE-2019-3802)
* undertow: leak credentials to log files UndertowLogger.REQUEST_LOGGER.undertowRequestFailed (CVE-2019-3888)
* shiro: Cookie padding oracle vulnerability with default configuration (CVE-2019-12422)
* jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server via crafted JSON message. (CVE-2019-12814)
* jackson-databind: Polymorphic typing issue related to logback/JNDI (CVE-2019-14439)
* springframework: DoS Attack via Range Requests (CVE-2018-15756)
* c3p0: loading XML configuration leads to denial of service (CVE-2019-5427)
* undertow: Information leak in requests for directories without trailing slashes (CVE-2019-10184)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "A minor version update (from 7.5 to 7.6) is now available for Red Hat Fuse. The purpose of this text-only errata is to inform you about the security issues fixed in this release.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.\n\n[2020-04-17 update: descriptions for mutiple components fixed for the same CVE added; also added golang CVE descriptions that were unintentionally ommitted from the original publication]", "title": "Topic" }, { "category": "general", "text": "This release of Red Hat Fuse 7.6.0 serves as a replacement for Red Hat Fuse 7.5, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.\n\nSecurity Fix(es):\n\n* undertow: HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* golang: HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* undertow: HTTP/2: flood using PRIORITY frames results in excessive resource consumption (CVE-2019-9513)\n\n* undertow: HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* golang: HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* undertow: HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\n* undertow: HTTP/2: 0-length headers lead to denial of service (CVE-2019-9516)\n\n* undertow: HTTP/2: request for large response leads to denial of service (CVE-2019-9517)\n\n* undertow: HTTP/2: flood using empty frames results in excessive resource consumption (CVE-2019-9518)\n\n* infinispan: invokeAccessibly method from ReflectionUtil class allows to invoke private methods (CVE-2019-10174)\n\n* spring-security-core: mishandling of user passwords allows logging in with a password of NULL (CVE-2019-11272)\n\n* jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution (CVE-2019-12384)\n\n* jackson-databind: default typing mishandling leading to remote code execution (CVE-2019-14379)\n\n* xmlrpc: Deserialization of server-side exception from faultCause in XMLRPC error response (CVE-2019-17570)\n\n* js-jquery: Cross-site scripting via cross-domain ajax requests (CVE-2015-9251)\n\n* logback: Serialization vulnerability in SocketServer and ServerSocketReceiver (CVE-2017-5929)\n\n* js-jquery: XSS in responses from cross-origin ajax requests (CVE-2017-16012)\n\n* apache-commons-compress: ZipArchiveInputStream.read() fails to identify correct EOF allowing for DoS via crafted zip (CVE-2018-11771)\n\n* spring-data-api: potential information disclosure through maliciously crafted example value in ExampleMatcher (CVE-2019-3802)\n\n* undertow: leak credentials to log files UndertowLogger.REQUEST_LOGGER.undertowRequestFailed (CVE-2019-3888)\n\n* shiro: Cookie padding oracle vulnerability with default configuration (CVE-2019-12422)\n\n* jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server via crafted JSON message. (CVE-2019-12814)\n\n* jackson-databind: Polymorphic typing issue related to logback/JNDI (CVE-2019-14439)\n\n* springframework: DoS Attack via Range Requests (CVE-2018-15756)\n\n* c3p0: loading XML configuration leads to denial of service (CVE-2019-5427)\n\n* undertow: Information leak in requests for directories without trailing slashes (CVE-2019-10184)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:0983", "url": "https://access.redhat.com/errata/RHSA-2020:0983" }, { "category": "external", "summary": "1730316", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1730316" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735741", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735741" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "1737517", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1737517" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=jboss.fuse\u0026version=7.6.0", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=jboss.fuse\u0026version=7.6.0" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "url": "https://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/" }, { "category": "external", "summary": "1399546", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1399546" }, { "category": "external", "summary": "1432858", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1432858" }, { "category": "external", "summary": "1591854", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1591854" }, { "category": "external", "summary": "1618573", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618573" }, { "category": "external", "summary": "1643043", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1643043" }, { "category": "external", "summary": "1693777", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1693777" }, { "category": "external", "summary": "1703469", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1703469" }, { "category": "external", "summary": "1709860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1709860" }, { "category": "external", "summary": "1713068", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1713068" }, { "category": "external", "summary": "1725795", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1725795" }, { "category": "external", "summary": "1725807", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1725807" }, { "category": "external", "summary": "1728993", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1728993" }, { "category": "external", "summary": "1741864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741864" }, { "category": "external", "summary": "1741868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741868" }, { "category": "external", "summary": "1752962", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752962" }, { "category": "external", "summary": "1774726", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774726" }, { "category": "external", "summary": "1775193", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775193" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_0983.json" } ], "title": "Red Hat Security Advisory: Red Hat Fuse 7.6.0 security update", "tracking": { "current_release_date": "2025-08-07T12:28:44+00:00", "generator": { "date": "2025-08-07T12:28:44+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2020:0983", "initial_release_date": "2020-03-26T15:46:59+00:00", "revision_history": [ { "date": "2020-03-26T15:46:59+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-04-20T07:19:13+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-07T12:28:44+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Fuse 7.6.0", "product": { "name": "Red Hat Fuse 7.6.0", "product_id": "Red Hat Fuse 7.6.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_fuse:7" } } } ], "category": "product_family", "name": "Red Hat JBoss Fuse" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-9251", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2016-11-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1399546" } ], "notes": [ { "category": "description", "text": "jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed.", "title": "Vulnerability description" }, { "category": "summary", "text": "jquery: Cross-site scripting via cross-domain ajax requests", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-9251" }, { "category": "external", "summary": "RHBZ#1399546", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1399546" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-9251", "url": "https://www.cve.org/CVERecord?id=CVE-2015-9251" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-9251", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-9251" } ], "release_date": "2015-06-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jquery: Cross-site scripting via cross-domain ajax requests" }, { "cve": "CVE-2017-5929", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2017-03-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1432858" } ], "notes": [ { "category": "description", "text": "It was found that logback is vulnerable to a deserialization issue. Logback can be configured to allow remote logging through SocketServer/ServerSocketReceiver interfaces that can accept untrusted serialized data. Authenticated attackers on the adjacent network can leverage this vulnerability to execute arbitrary code through deserialization of custom gadget chains.", "title": "Vulnerability description" }, { "category": "summary", "text": "logback: Serialization vulnerability in SocketServer and ServerSocketReceiver", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-5929" }, { "category": "external", "summary": "RHBZ#1432858", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1432858" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-5929", "url": "https://www.cve.org/CVERecord?id=CVE-2017-5929" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5929", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5929" } ], "release_date": "2017-02-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "logback: Serialization vulnerability in SocketServer and ServerSocketReceiver" }, { "cve": "CVE-2017-16012", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2018-06-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1591854" } ], "notes": [ { "category": "description", "text": "[REJECTED CVE] This CVE has been rejected. This candidate is a duplicate of CVE-2015-9251. Note: All CVE users should reference CVE-2015-9251 instead of this candidate.", "title": "Vulnerability description" }, { "category": "summary", "text": "js-jquery: XSS in responses from cross-origin ajax requests", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-16012" }, { "category": "external", "summary": "RHBZ#1591854", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1591854" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-16012", "url": "https://www.cve.org/CVERecord?id=CVE-2017-16012" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-16012", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-16012" } ], "release_date": "2017-03-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "js-jquery: XSS in responses from cross-origin ajax requests" }, { "cve": "CVE-2018-11771", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2018-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618573" } ], "notes": [ { "category": "description", "text": "When reading a specially crafted ZIP archive, the read method of Apache Commons Compress 1.7 to 1.17\u0027s ZipArchiveInputStream can fail to return the correct EOF indication after the end of the stream has been reached. When combined with a java.io.InputStreamReader this can lead to an infinite stream, which can be used to mount a denial of service attack against services that use Compress\u0027 zip package.", "title": "Vulnerability description" }, { "category": "summary", "text": "apache-commons-compress: ZipArchiveInputStream.read() fails to identify correct EOF allowing for DoS via crafted zip", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-11771" }, { "category": "external", "summary": "RHBZ#1618573", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618573" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-11771", "url": "https://www.cve.org/CVERecord?id=CVE-2018-11771" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-11771", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11771" }, { "category": "external", "summary": "https://lists.apache.org/thread.html/b8da751fc0ca949534cdf2744111da6bb0349d2798fac94b0a50f330@%3Cannounce.apache.org%3E", "url": "https://lists.apache.org/thread.html/b8da751fc0ca949534cdf2744111da6bb0349d2798fac94b0a50f330@%3Cannounce.apache.org%3E" } ], "release_date": "2018-08-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "apache-commons-compress: ZipArchiveInputStream.read() fails to identify correct EOF allowing for DoS via crafted zip" }, { "cve": "CVE-2018-12536", "cwe": { "id": "CWE-209", "name": "Generation of Error Message Containing Sensitive Information" }, "discovery_date": "2018-06-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1597418" } ], "notes": [ { "category": "description", "text": "In Eclipse Jetty Server, all 9.x versions, on webapps deployed using default Error Handling, when an intentionally bad query arrives that doesn\u0027t match a dynamic url-pattern, and is eventually handled by the DefaultServlet\u0027s static file serving, the bad characters can trigger a java.nio.file.InvalidPathException which includes the full path to the base resource directory that the DefaultServlet and/or webapp is using. If this InvalidPathException is then handled by the default Error Handler, the InvalidPathException message is included in the error response, revealing the full server path to the requesting system.", "title": "Vulnerability description" }, { "category": "summary", "text": "jetty: full server path revealed when using the default Error Handling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-12536" }, { "category": "external", "summary": "RHBZ#1597418", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1597418" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-12536", "url": "https://www.cve.org/CVERecord?id=CVE-2018-12536" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12536", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12536" } ], "release_date": "2018-06-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" }, { "category": "workaround", "details": "Information disclosure occurs when java.nio.file.InvalidPathException occurs and is handled by the default Jetty error handler. To protect against this, a custom error handler can be configured for that particular error or for a larger set of errors according to the documentation link below. Red Hat Product Security advises that production deployments on Jetty use custom error handlers to limit the information disclosed and to ensure effective logging of error conditions.\n\nhttp://www.eclipse.org/jetty/documentation/current/custom-error-pages.html", "product_ids": [ "Red Hat Fuse 7.6.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "jetty: full server path revealed when using the default Error Handling" }, { "cve": "CVE-2018-15756", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2018-10-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1643043" } ], "notes": [ { "category": "description", "text": "Spring Framework, version 5.1, versions 5.0.x prior to 5.0.10, versions 4.3.x prior to 4.3.20, and older unsupported versions on the 4.2.x branch provide support for range requests when serving static resources through the ResourceHttpRequestHandler, or starting in 5.0 when an annotated controller returns an org.springframework.core.io.Resource. A malicious user (or attacker) can add a range header with a high number of ranges, or with wide ranges that overlap, or both, for a denial of service attack. This vulnerability affects applications that depend on either spring-webmvc or spring-webflux. Such applications must also have a registration for serving static resources (e.g. JS, CSS, images, and others), or have an annotated controller that returns an org.springframework.core.io.Resource. Spring Boot applications that depend on spring-boot-starter-web or spring-boot-starter-webflux are ready to serve static resources out of the box and are therefore vulnerable.", "title": "Vulnerability description" }, { "category": "summary", "text": "springframework: DoS Attack via Range Requests", "title": "Vulnerability summary" }, { "category": "other", "text": "The package rhvm-dependencies does not include the vulnerable spring-webmvc component.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-15756" }, { "category": "external", "summary": "RHBZ#1643043", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1643043" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-15756", "url": "https://www.cve.org/CVERecord?id=CVE-2018-15756" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-15756", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-15756" }, { "category": "external", "summary": "https://pivotal.io/security/cve-2018-15756", "url": "https://pivotal.io/security/cve-2018-15756" } ], "release_date": "2018-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "springframework: DoS Attack via Range Requests" }, { "cve": "CVE-2019-3802", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-06-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1730316" } ], "notes": [ { "category": "description", "text": "This affects Spring Data JPA in versions up to and including 2.1.6, 2.0.14 and 1.11.20. ExampleMatcher using ExampleMatcher.StringMatcher.STARTING, ExampleMatcher.StringMatcher.ENDING or ExampleMatcher.StringMatcher.CONTAINING could return more results than anticipated when a maliciously crafted example value is supplied.", "title": "Vulnerability description" }, { "category": "summary", "text": "spring-data-api: potential information disclosure through maliciously crafted example value in ExampleMatcher", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-3802" }, { "category": "external", "summary": "RHBZ#1730316", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1730316" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-3802", "url": "https://www.cve.org/CVERecord?id=CVE-2019-3802" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-3802", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3802" }, { "category": "external", "summary": "https://pivotal.io/security/cve-2019-3802", "url": "https://pivotal.io/security/cve-2019-3802" } ], "release_date": "2019-07-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "spring-data-api: potential information disclosure through maliciously crafted example value in ExampleMatcher" }, { "acknowledgments": [ { "names": [ "Carter Kozak" ] } ], "cve": "CVE-2019-3888", "cwe": { "id": "CWE-532", "name": "Insertion of Sensitive Information into Log File" }, "discovery_date": "2019-03-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1693777" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Undertow web server before 2.0.21. An information exposure of plain text credentials through log files because Connectors.executeRootHandler:402 logs the HttpServerExchange object at ERROR level using UndertowLogger.REQUEST_LOGGER.undertowRequestFailed(t, exchange)", "title": "Vulnerability description" }, { "category": "summary", "text": "undertow: leak credentials to log files UndertowLogger.REQUEST_LOGGER.undertowRequestFailed", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-3888" }, { "category": "external", "summary": "RHBZ#1693777", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1693777" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-3888", "url": "https://www.cve.org/CVERecord?id=CVE-2019-3888" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-3888", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3888" } ], "release_date": "2019-06-10T15:13:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "undertow: leak credentials to log files UndertowLogger.REQUEST_LOGGER.undertowRequestFailed" }, { "cve": "CVE-2019-5427", "cwe": { "id": "CWE-776", "name": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)" }, "discovery_date": "2019-04-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1709860" } ], "notes": [ { "category": "description", "text": "c3p0 version \u003c 0.9.5.4 may be exploited by a billion laughs attack when loading XML configuration due to missing protections against recursive entity expansion when loading configuration.", "title": "Vulnerability description" }, { "category": "summary", "text": "c3p0: loading XML configuration leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 is not vulnerable to this issue, because the candlepin component who uses the c3p0 jar never passes a XML configuration file to c3p0, even though it includes a vulnerable version of the latter. Since this issue requires a XML files to be loaded by c3p0, an exploitation path doesn\u0027t exist.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-5427" }, { "category": "external", "summary": "RHBZ#1709860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1709860" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-5427", "url": "https://www.cve.org/CVERecord?id=CVE-2019-5427" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-5427", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5427" } ], "release_date": "2019-04-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "c3p0: loading XML configuration leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9513", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735741" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker, using PRIORITY frames to flood the system, could cause excessive CPU usage and starvation of other clients. The largest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PRIORITY frames results in excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for packages nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9513" }, { "category": "external", "summary": "RHBZ#1735741", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735741" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9513", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9513" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9513", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9513" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nghttp2.org/blog/2019/08/19/nghttp2-v1-39-2/", "url": "https://nghttp2.org/blog/2019/08/19/nghttp2-v1-39-2/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "Red Hat Fuse 7.6.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PRIORITY frames results in excessive resource consumption" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "cve": "CVE-2019-9516", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741864" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker, sending a stream of header with a 0-length header name and a 0-length header value, could cause some implementations to allocate memory for these headers and keep the allocations alive until the session dies. The can consume excess memory, potentially leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: 0-length headers lead to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9516" }, { "category": "external", "summary": "RHBZ#1741864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741864" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9516", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9516" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9516", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9516" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://github.com/nghttp2/nghttp2/issues/1382#", "url": "https://github.com/nghttp2/nghttp2/issues/1382#" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "Red Hat Fuse 7.6.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: 0-length headers lead to denial of service" }, { "cve": "CVE-2019-9517", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741868" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in HTTP/2. An attacker can open a HTTP/2 window so the peer can send without constraint. The TCP window remains closed so the peer cannot write the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the server\u0027s queue is setup, the responses can consume excess memory, CPU, or both, potentially leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: request for large response leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "The package httpd versions as shipped with Red Hat Enterprise Linux 5, 6 and 7 are not affected by this issue as HTTP/2 support is not provided.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9517" }, { "category": "external", "summary": "RHBZ#1741868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741868" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9517", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9517" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9517", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9517" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" }, { "category": "workaround", "details": "The httpd version shipped with Red Hat Enterprise Linux 8 provides HTTP/2 support through mod_http2 package. While mod_http2 package is not updated, users can disable HTTP/2 support as mitigation action by executing the following steps:\n\n1. Stop httpd service:\n$ systemctl stop httpd\n\n2. Remove http/2 protocol support from configuration files:\n$ sed -i \u0027s/\\(h2\\)\\|\\(h2c\\)//g\u0027 \u003chttpd_config_file\u003e\n\n3. Validate configuration files to make sure all syntax is valid:\n$ apachectl configtest\n\n4. Restart httpd service:\n$ systemctl start httpd", "product_ids": [ "Red Hat Fuse 7.6.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: request for large response leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9518", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735749" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using frames with an empty payload, a flood could occur that results in excessive CPU usage and starvation of other clients. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using empty frames results in excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9518" }, { "category": "external", "summary": "RHBZ#1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9518", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9518" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using empty frames results in excessive resource consumption" }, { "cve": "CVE-2019-10174", "cwe": { "id": "CWE-470", "name": "Use of Externally-Controlled Input to Select Classes or Code (\u0027Unsafe Reflection\u0027)" }, "discovery_date": "2018-10-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1703469" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Infinispan such that the invokeAccessibly method from the public class ReflectionUtil allows any application class to invoke private methods in any class with Infinispan\u0027s privileges. The attacker can use reflection to introduce new, malicious behavior into the application.", "title": "Vulnerability description" }, { "category": "summary", "text": "infinispan: invokeAccessibly method from ReflectionUtil class allows to invoke private methods", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform\u0027s OpenDaylight contains the vulnerable library. This library is a requirement of other dependencies (Karaf and Hibernate). Under supported deployments, the vulnerable functionality is not utilized. Based on this, no OpenDaylight versions will not be fixed.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10174" }, { "category": "external", "summary": "RHBZ#1703469", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1703469" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10174", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10174" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10174", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10174" } ], "release_date": "2019-11-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" }, { "category": "workaround", "details": "There is no known mitigation for this issue.", "product_ids": [ "Red Hat Fuse 7.6.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "infinispan: invokeAccessibly method from ReflectionUtil class allows to invoke private methods" }, { "acknowledgments": [ { "names": [ "Christian Schl\u00fcter" ], "organization": "Viada" } ], "cve": "CVE-2019-10184", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "discovery_date": "2019-03-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1713068" } ], "notes": [ { "category": "description", "text": "undertow before version 2.0.23.Final is vulnerable to an information leak issue. Web apps may have their directory structures predicted through requests without trailing slashes via the api.", "title": "Vulnerability description" }, { "category": "summary", "text": "undertow: Information leak in requests for directories without trailing slashes", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10184" }, { "category": "external", "summary": "RHBZ#1713068", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1713068" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10184", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10184" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10184", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10184" } ], "release_date": "2019-07-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "undertow: Information leak in requests for directories without trailing slashes" }, { "cve": "CVE-2019-10241", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2019-04-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1705924" } ], "notes": [ { "category": "description", "text": "In Eclipse Jetty version 9.2.26 and older, 9.3.25 and older, and 9.4.15 and older, the server is vulnerable to XSS conditions if a remote client USES a specially formatted URL against the DefaultServlet or ResourceHandler that is configured for showing a Listing of directory contents.", "title": "Vulnerability description" }, { "category": "summary", "text": "jetty: using specially formatted URL against DefaultServlet or ResourceHandler leads to XSS conditions", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of jetty which is embedded in the nutch package as shipped with Red Hat Satellite 5. The jetty server is not exposed, as such exploitation is difficult, Red Hat Product Security has rated this issue as having security impact of Low in the context of Red Hat Satellite 5. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10241" }, { "category": "external", "summary": "RHBZ#1705924", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1705924" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10241", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10241" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10241", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10241" } ], "release_date": "2019-04-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jetty: using specially formatted URL against DefaultServlet or ResourceHandler leads to XSS conditions" }, { "cve": "CVE-2019-10247", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-04-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1705993" } ], "notes": [ { "category": "description", "text": "In Eclipse Jetty version 7.x, 8.x, 9.2.27 and older, 9.3.26 and older, and 9.4.16 and older, the server running on any OS and Jetty version combination will reveal the configured fully qualified directory base resource location on the output of the 404 error for not finding a Context that matches the requested path. The default server behavior on jetty-distribution and jetty-home will include at the end of the Handler tree a DefaultHandler, which is responsible for reporting this 404 error, it presents the various configured contexts as HTML for users to click through to. This produced HTML includes output that contains the configured fully qualified directory base resource location for each context.", "title": "Vulnerability description" }, { "category": "summary", "text": "jetty: error path information disclosure", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of jetty which is embedded in the nutch package as shipped with Red Hat Satellite 5. The jetty server is not exposed, as such exploitation is difficult, Red Hat Product Security has rated this issue as having security impact of Low in the context of Red Hat Satellite 5. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10247" }, { "category": "external", "summary": "RHBZ#1705993", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1705993" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10247", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10247" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10247", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10247" } ], "release_date": "2019-04-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "jetty: error path information disclosure" }, { "cve": "CVE-2019-11272", "cwe": { "id": "CWE-305", "name": "Authentication Bypass by Primary Weakness" }, "discovery_date": "2019-06-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1728993" } ], "notes": [ { "category": "description", "text": "A flaw was found in Spring Security in several versions, in the use of plain text passwords using the PlaintextPasswordEncoder. If an application is using an affected version of Spring Security with the PlaintextPasswordEncoder and a user has a null encoded password, an attacker can use this flaw to authenticate using a password of \"null.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "spring-security-core: mishandling of user passwords allows logging in with a password of NULL", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform\u0027s OpenDaylight versions 9 and 10 contain the vulnerable code. However, these OpenDaylight versions were released as technical preview with limited support and will therefore not be updated. Other OpenDaylight versions do not contain the vulnerable library.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-11272" }, { "category": "external", "summary": "RHBZ#1728993", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1728993" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-11272", "url": "https://www.cve.org/CVERecord?id=CVE-2019-11272" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11272", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11272" }, { "category": "external", "summary": "https://pivotal.io/security/cve-2019-11272", "url": "https://pivotal.io/security/cve-2019-11272" } ], "release_date": "2019-07-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "spring-security-core: mishandling of user passwords allows logging in with a password of NULL" }, { "cve": "CVE-2019-12384", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-06-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1725807" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in FasterXML jackson-databind in versions prior to 2.9.9. The vulnerability would permit polymorphic deserialization of malicious objects using the logback-core gadget when used in conjunction with polymorphic type handling methods such as `enableDefaultTyping()` or when @JsonTypeInfo is using `Id.CLASS` or `Id.MINIMAL_CLASS` or in any other way which ObjectMapper.readValue might instantiate objects from unsafe sources. Depending on the classpath content, remote code execution may be possible.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack\u0027s OpenDaylight does not use logback in any supported configuration. Therefore, the prerequisites for this vulnerability are not present and OpenDaylight is not affected.\n\nThis vulnerability relies on logback-core (ch.qos.logback.core) being present in the application\u0027s ClassPath. Logback-core is not packaged as an RPM for Red Hat Enterprise Linux or Red Hat Software Collections. Applications using jackson-databind that do not also use logback-core are not impacted by this vulnerability.\n\nThis issue affects the versions of jackson-databind bundled with candlepin as shipped with Red Hat Satellite 6.x. However the affected code is NOT used at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-12384" }, { "category": "external", "summary": "RHBZ#1725807", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1725807" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-12384", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12384" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-12384", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-12384" } ], "release_date": "2019-06-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Fuse 7.6.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution" }, { "cve": "CVE-2019-12422", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2019-11-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1774726" } ], "notes": [ { "category": "description", "text": "Apache Shiro before 1.4.2, when using the default \"remember me\" configuration, cookies could be susceptible to a padding attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "shiro: Cookie padding oracle vulnerability with default configuration", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-12422" }, { "category": "external", "summary": "RHBZ#1774726", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774726" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-12422", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12422" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-12422", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-12422" } ], "release_date": "2019-11-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shiro: Cookie padding oracle vulnerability with default configuration" }, { "cve": "CVE-2019-12814", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-06-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1725795" } ], "notes": [ { "category": "description", "text": "A new polymorphic typing flaw was discovered in FasterXML jackson-databind, versions 2.x through 2.9.9. With default typing enabled, an attacker can send a specifically crafted JSON message to the server that allows them to read arbitrary local files.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server via crafted JSON message.", "title": "Vulnerability summary" }, { "category": "other", "text": "* Red Hat Satellite 6 does not include the jdom or jdom2 packages, thus it is not affected by this vulnerability. \n* Red Hat OpenStack\u0027s OpenDaylight does not include the jdom or jdom2 packages, thus it is not affected by this vulnerability.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-12814" }, { "category": "external", "summary": "RHBZ#1725795", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1725795" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-12814", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12814" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-12814", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-12814" } ], "release_date": "2019-06-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" }, { "category": "workaround", "details": "This vulnerability relies on jdom (org.jdom) or jdom2 (org.jdom2) being present in the application\u0027s ClassPath. Applications using jackson-databind that do not also use jdom or jdom2 are not impacted by this vulnerability.", "product_ids": [ "Red Hat Fuse 7.6.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server via crafted JSON message." }, { "cve": "CVE-2019-14379", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-07-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1737517" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in FasterXML jackson-databind, where it would permit polymorphic deserialization of malicious objects using the ehcache and logback JNDI gadgets when used in conjunction with polymorphic type handling methods such as `enableDefaultTyping()` or when @JsonTypeInfo is using `Id.CLASS` or `Id.MINIMAL_CLASS` or in any other way which ObjectMapper.readValue might instantiate objects from unsafe sources. An attacker could use this flaw to execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: default typing mishandling leading to remote code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "While OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nSimilarly, Satellite 6 does not enable polymorphic unmarshmalling, which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14379" }, { "category": "external", "summary": "RHBZ#1737517", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1737517" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14379", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14379" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14379", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14379" } ], "release_date": "2019-07-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Fuse 7.6.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: default typing mishandling leading to remote code execution" }, { "cve": "CVE-2019-14439", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-07-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1752962" } ], "notes": [ { "category": "description", "text": "A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x before 2.9.9.2. This occurs when Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the logback jar in the classpath.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Polymorphic typing issue related to logback/JNDI", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenDaylight provided as part of Red Hat OpenStack does not utilize logback when used in a supported configuration. Therefore, the prerequisites for this vulnerability are not present and OpenDaylight is not affected.\n\nSatellite 6 does not enable polymorphic unmarshmalling, which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14439" }, { "category": "external", "summary": "RHBZ#1752962", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752962" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14439", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14439" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14439", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14439" } ], "release_date": "2019-07-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Fuse 7.6.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Polymorphic typing issue related to logback/JNDI" }, { "acknowledgments": [ { "names": [ "Guillaume Teissier" ], "organization": "Orange" } ], "cve": "CVE-2019-17570", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-11-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1775193" } ], "notes": [ { "category": "description", "text": "A flaw was discovered where the XMLRPC client implementation in Apache XMLRPC, performed deserialization of the server-side exception serialized in the faultCause attribute of XMLRPC error response messages. A malicious or compromised XMLRPC server could possibly use this flaw to execute arbitrary code with the privileges of an application using the Apache XMLRPC client library.", "title": "Vulnerability description" }, { "category": "summary", "text": "xmlrpc: Deserialization of server-side exception from faultCause in XMLRPC error response", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 7 provides vulnerable version of xmlrpc via the Optional repository. As the Optional repository is not supported, this issue is not planned to be addressed there.\n\nRed Hat Virtualization Manager uses xmlrpc only for internal communication with the scheduler. Since this is a component of the Manager itself, it is not subject to attacker influence and does not represent an attack surface.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-17570" }, { "category": "external", "summary": "RHBZ#1775193", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775193" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-17570", "url": "https://www.cve.org/CVERecord?id=CVE-2019-17570" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-17570", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17570" }, { "category": "external", "summary": "https://github.com/orangecertcc/security-research/security/advisories/GHSA-x2r6-4m45-m4jp", "url": "https://github.com/orangecertcc/security-research/security/advisories/GHSA-x2r6-4m45-m4jp" } ], "release_date": "2020-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" }, { "category": "workaround", "details": "There is no known mitigation other than restricting applications using the Apache XMLRPC client library from sending requests to untrusted XMLRPC servers.", "product_ids": [ "Red Hat Fuse 7.6.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xmlrpc: Deserialization of server-side exception from faultCause in XMLRPC error response" } ] }
rhsa-2019:3933
Vulnerability from csaf_redhat
Published
2019-11-20 16:14
Modified
2025-08-06 05:01
Summary
Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.37 Security Release on RHEL 7
Notes
Topic
An update is now available for JBoss Core Services on RHEL 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
This release adds the new Apache HTTP Server 2.4.37 packages that are part of the JBoss Core Services offering.
This release serves as a replacement for Red Hat JBoss Core Services Pack Apache Server 2.4.29 and includes bug fixes and enhancements. Refer to the Release Notes for information on the most significant bug fixes and enhancements included in this release.
Security Fix(es):
* openssl: RSA key generation cache timing vulnerability in crypto/rsa/rsa_gen.c allows attackers to recover private keys (CVE-2018-0737)
* openssl: timing side channel attack in the DSA signature algorithm (CVE-2018-0734)
* mod_auth_digest: access control bypass due to race condition (CVE-2019-0217)
* openssl: Side-channel vulnerability on SMT/Hyper-Threading architectures (PortSmash) (CVE-2018-5407)
* mod_session_cookie does not respect expiry time (CVE-2018-17199)
* mod_http2: DoS via slow, unneeded request bodies (CVE-2018-17189)
* mod_http2: possible crash on late upgrade (CVE-2019-0197)
* mod_http2: read-after-free on a string compare (CVE-2019-0196)
* nghttp2: HTTP/2: large amount of data request leads to denial of service (CVE-2019-9511)
* nghttp2: HTTP/2: flood using PRIORITY frames resulting in excessive resource consumption (CVE-2019-9513)
* mod_http2: HTTP/2: 0-length headers leads to denial of service (CVE-2019-9516)
* mod_http2: HTTP/2: request for large response leads to denial of service (CVE-2019-9517)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for JBoss Core Services on RHEL 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "This release adds the new Apache HTTP Server 2.4.37 packages that are part of the JBoss Core Services offering.\n\nThis release serves as a replacement for Red Hat JBoss Core Services Pack Apache Server 2.4.29 and includes bug fixes and enhancements. Refer to the Release Notes for information on the most significant bug fixes and enhancements included in this release.\n\nSecurity Fix(es):\n\n* openssl: RSA key generation cache timing vulnerability in crypto/rsa/rsa_gen.c allows attackers to recover private keys (CVE-2018-0737)\n* openssl: timing side channel attack in the DSA signature algorithm (CVE-2018-0734)\n* mod_auth_digest: access control bypass due to race condition (CVE-2019-0217)\n* openssl: Side-channel vulnerability on SMT/Hyper-Threading architectures (PortSmash) (CVE-2018-5407)\n* mod_session_cookie does not respect expiry time (CVE-2018-17199)\n* mod_http2: DoS via slow, unneeded request bodies (CVE-2018-17189)\n* mod_http2: possible crash on late upgrade (CVE-2019-0197)\n* mod_http2: read-after-free on a string compare (CVE-2019-0196)\n* nghttp2: HTTP/2: large amount of data request leads to denial of service (CVE-2019-9511)\n* nghttp2: HTTP/2: flood using PRIORITY frames resulting in excessive resource consumption (CVE-2019-9513)\n* mod_http2: HTTP/2: 0-length headers leads to denial of service (CVE-2019-9516)\n* mod_http2: HTTP/2: request for large response leads to denial of service (CVE-2019-9517)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:3933", "url": "https://access.redhat.com/errata/RHSA-2019:3933" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1568253", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568253" }, { "category": "external", "summary": "1644364", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1644364" }, { "category": "external", "summary": "1645695", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1645695" }, { "category": "external", "summary": "1668493", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1668493" }, { "category": "external", "summary": "1668497", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1668497" }, { "category": "external", "summary": "1695020", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1695020" }, { "category": "external", "summary": "1695030", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1695030" }, { "category": "external", "summary": "1695042", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1695042" }, { "category": "external", "summary": "1735741", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735741" }, { "category": "external", "summary": "1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "1741864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741864" }, { "category": "external", "summary": "1741868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741868" }, { "category": "external", "summary": "JBCS-798", "url": "https://issues.redhat.com/browse/JBCS-798" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_3933.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.37 Security Release on RHEL 7", "tracking": { "current_release_date": "2025-08-06T05:01:15+00:00", "generator": { "date": "2025-08-06T05:01:15+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2019:3933", "initial_release_date": "2019-11-20T16:14:21+00:00", "revision_history": [ { "date": "2019-11-20T16:14:21+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-01-06T13:04:40+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-06T05:01:15+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Core Services on RHEL 7 Server", "product": { "name": "Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_core_services:1::el7" } } } ], "category": "product_family", "name": "Red Hat JBoss Core Services" }, { "branches": [ { "category": "product_version", "name": "jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-jansson@2.11-20.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-jansson-devel@2.11-20.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-jansson-debuginfo@2.11-20.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr@1.6.3-63.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-devel@1.6.3-63.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-debuginfo@1.6.3-63.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.1.1-25.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-devel@1.1.1-25.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-libs@1.1.1-25.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-perl@1.1.1-25.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-static@1.1.1-25.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-debuginfo@1.1.1-25.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util@1.6.1-48.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-devel@1.6.1-48.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-ldap@1.6.1-48.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-mysql@1.6.1-48.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-nss@1.6.1-48.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-odbc@1.6.1-48.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-openssl@1.6.1-48.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-pgsql@1.6.1-48.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-sqlite@1.6.1-48.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-debuginfo@1.6.1-48.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-brotli@1.0.6-7.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-brotli-devel@1.0.6-7.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-brotli-debuginfo@1.0.6-7.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2@1.39.2-4.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2-devel@1.39.2-4.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2-debuginfo@1.39.2-4.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-curl@7.64.1-14.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-libcurl@7.64.1-14.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-libcurl-devel@7.64.1-14.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-curl-debuginfo@7.64.1-14.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.37-33.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-devel@2.4.37-33.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-selinux@2.4.37-33.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-tools@2.4.37-33.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ldap@2.4.37-33.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md@2.4.37-33.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html@2.4.37-33.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_session@2.4.37-33.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ssl@2.4.37-33.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-debuginfo@2.4.37-33.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-ap24@1.2.46-22.redhat_1.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-manual@1.2.46-22.redhat_1.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-debuginfo@1.2.46-22.redhat_1.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native@1.3.12-9.Final_redhat_2.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native-debuginfo@1.3.12-9.Final_redhat_2.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.2-16.GA.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security-debuginfo@2.9.2-16.GA.jbcs.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.src", "product": { "name": "jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.src", "product_id": "jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-jansson@2.11-20.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.src", "product": { "name": "jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.src", "product_id": "jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr@1.6.3-63.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.src", "product": { "name": "jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.src", "product_id": "jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.1.1-25.jbcs.el7?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.src", "product": { "name": "jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.src", "product_id": "jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util@1.6.1-48.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.src", "product": { "name": "jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.src", "product_id": "jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-brotli@1.0.6-7.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.src", "product": { "name": "jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.src", "product_id": "jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2@1.39.2-4.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.src", "product": { "name": "jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.src", "product_id": "jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-curl@7.64.1-14.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.src", "product": { "name": "jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.src", "product_id": "jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.37-33.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el7.src", "product": { "name": "jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el7.src", "product_id": "jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk@1.2.46-22.redhat_1.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.src", "product": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.src", "product_id": "jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native@1.3.12-9.Final_redhat_2.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.src", "product": { "name": "jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.src", "product_id": "jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.2-16.GA.jbcs.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el7.noarch", "product": { "name": "jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el7.noarch", "product_id": "jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-manual@2.4.37-33.jbcs.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el7.noarch as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el7.noarch" }, "product_reference": "jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el7.noarch", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-0734", "cwe": { "id": "CWE-385", "name": "Covert Timing Channel" }, "discovery_date": "2018-10-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1644364" } ], "notes": [ { "category": "description", "text": "The OpenSSL DSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.1a (Affected 1.1.1). Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.0.2q (Affected 1.0.2-1.0.2p).", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: timing side channel attack in the DSA signature algorithm", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-0734" }, { "category": "external", "summary": "RHBZ#1644364", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1644364" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-0734", "url": "https://www.cve.org/CVERecord?id=CVE-2018-0734" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-0734", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0734" } ], "release_date": "2018-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-20T16:14:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. After installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3933" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "openssl: timing side channel attack in the DSA signature algorithm" }, { "cve": "CVE-2018-0737", "cwe": { "id": "CWE-385", "name": "Covert Timing Channel" }, "discovery_date": "2018-04-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1568253" } ], "notes": [ { "category": "description", "text": "OpenSSL RSA key generation was found to be vulnerable to cache side-channel attacks. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover parts of the private key.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: RSA key generation cache timing vulnerability in crypto/rsa/rsa_gen.c allows attackers to recover private keys", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-0737" }, { "category": "external", "summary": "RHBZ#1568253", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568253" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-0737", "url": "https://www.cve.org/CVERecord?id=CVE-2018-0737" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-0737", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0737" }, { "category": "external", "summary": "http://www.openwall.com/lists/oss-security/2018/04/16/3", "url": "http://www.openwall.com/lists/oss-security/2018/04/16/3" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20180416.txt", "url": "https://www.openssl.org/news/secadv/20180416.txt" } ], "release_date": "2018-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-20T16:14:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. After installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3933" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "openssl: RSA key generation cache timing vulnerability in crypto/rsa/rsa_gen.c allows attackers to recover private keys" }, { "acknowledgments": [ { "names": [ "Alejandro Cabrera Aldaya" ], "organization": "Universidad Tecnologica de la Habana CUJAE; Cuba" }, { "names": [ "Billy Bob Brumley", "Cesar Pereida Garcia", "Sohaib ul Hassan" ] }, { "names": [ "Nicola Tuveri" ], "organization": "Tampere University of Technology; Finland" } ], "cve": "CVE-2018-5407", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-11-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1645695" } ], "notes": [ { "category": "description", "text": "A microprocessor side-channel vulnerability was found on SMT (e.g, Hyper-Threading) architectures. An attacker running a malicious process on the same core of the processor as the victim process can extract certain secret information.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Side-channel vulnerability on SMT/Hyper-Threading architectures (PortSmash)", "title": "Vulnerability summary" }, { "category": "other", "text": "This is a timing side-channel flaw on processors which implement SMT/Hyper-Threading architectures. It can result in leakage of secret data in applications such as OpenSSL that has secret dependent control flow at any granularity level. In order to exploit this flaw, the attacker needs to run a malicious process on the same core of the processor as the victim process.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-5407" }, { "category": "external", "summary": "RHBZ#1645695", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1645695" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-5407", "url": "https://www.cve.org/CVERecord?id=CVE-2018-5407" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-5407", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-5407" }, { "category": "external", "summary": "https://github.com/bbbrumley/portsmash", "url": "https://github.com/bbbrumley/portsmash" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20181112.txt", "url": "https://www.openssl.org/news/secadv/20181112.txt" } ], "release_date": "2018-10-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-20T16:14:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. After installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3933" }, { "category": "workaround", "details": "At this time Red Hat Engineering is working on patches for openssl package in Red Hat Enterprise Linux 7 to address this issue. Until fixes are available, users are advised to review the guidance supplied in the L1 Terminal Fault vulnerability article: https://access.redhat.com/security/vulnerabilities/L1TF and decide what their exposure across shared CPU threads are and act accordingly.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: Side-channel vulnerability on SMT/Hyper-Threading architectures (PortSmash)" }, { "cve": "CVE-2018-17189", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-01-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1668497" } ], "notes": [ { "category": "description", "text": "In Apache HTTP server versions 2.4.37 and prior, by sending request bodies in a slow loris way to plain resources, the h2 stream for that request unnecessarily occupied a server thread cleaning up that incoming data. This affects only HTTP/2 (mod_http2) connections.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_http2: DoS via slow, unneeded request bodies", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-17189" }, { "category": "external", "summary": "RHBZ#1668497", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1668497" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-17189", "url": "https://www.cve.org/CVERecord?id=CVE-2018-17189" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-17189", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-17189" } ], "release_date": "2019-01-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-20T16:14:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. After installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3933" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "httpd: mod_http2: DoS via slow, unneeded request bodies" }, { "cve": "CVE-2018-17199", "cwe": { "id": "CWE-613", "name": "Insufficient Session Expiration" }, "discovery_date": "2019-01-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1668493" } ], "notes": [ { "category": "description", "text": "In Apache HTTP Server 2.4 release 2.4.37 and prior, mod_session checks the session expiry time before decoding the session. This causes session expiry time to be ignored for mod_session_cookie sessions since the expiry time is loaded when the session is decoded.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_session_cookie does not respect expiry time", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-17199" }, { "category": "external", "summary": "RHBZ#1668493", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1668493" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-17199", "url": "https://www.cve.org/CVERecord?id=CVE-2018-17199" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-17199", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-17199" } ], "release_date": "2019-01-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-20T16:14:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. After installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3933" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: mod_session_cookie does not respect expiry time" }, { "cve": "CVE-2019-0196", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2019-04-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1695030" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Apache HTTP Server 2.4.17 to 2.4.38. Using fuzzed network input, the http/2 request handling could be made to access freed memory in string comparison when determining the method of a request and thus process the request incorrectly.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_http2: read-after-free on a string compare", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-0196" }, { "category": "external", "summary": "RHBZ#1695030", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1695030" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-0196", "url": "https://www.cve.org/CVERecord?id=CVE-2019-0196" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0196", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0196" }, { "category": "external", "summary": "http://www.apache.org/dist/httpd/CHANGES_2.4", "url": "http://www.apache.org/dist/httpd/CHANGES_2.4" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html", "url": "https://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2019-04-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-20T16:14:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. After installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3933" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "httpd: mod_http2: read-after-free on a string compare" }, { "cve": "CVE-2019-0197", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2019-04-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1695042" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Apache HTTP Server 2.4.34 to 2.4.38. When HTTP/2 was enabled for a http: host or H2Upgrade was enabled for h2 on a https: host, an Upgrade request from http/1.1 to http/2 that was not the first request on a connection could lead to a misconfiguration and crash. Server that never enabled the h2 protocol or that only enabled it for https: and did not set \"H2Upgrade on\" are unaffected by this issue.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_http2: possible crash on late upgrade", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-0197" }, { "category": "external", "summary": "RHBZ#1695042", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1695042" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-0197", "url": "https://www.cve.org/CVERecord?id=CVE-2019-0197" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0197", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0197" }, { "category": "external", "summary": "http://www.apache.org/dist/httpd/CHANGES_2.4", "url": "http://www.apache.org/dist/httpd/CHANGES_2.4" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html", "url": "https://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2019-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-20T16:14:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. After installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3933" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "httpd: mod_http2: possible crash on late upgrade" }, { "cve": "CVE-2019-0217", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2019-04-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1695020" } ], "notes": [ { "category": "description", "text": "A race condition was found in mod_auth_digest when the web server was running in a threaded MPM configuration. It could allow a user with valid credentials to authenticate using another username, bypassing configured access control restrictions.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_auth_digest: access control bypass due to race condition", "title": "Vulnerability summary" }, { "category": "other", "text": "Based on the the fact that digest authentication is rarely used in modern day web applications and httpd package shipped with Red Hat products do not ship threaded MPM configuration by default, this flaw has been rated as having Moderate level security impact. Red Hat Enterprise Linux 6 is now in Maintenance Support 2 Phase of the support and maintenance life cycle. This flaw has been rated as having a security impact of Moderate, and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-0217" }, { "category": "external", "summary": "RHBZ#1695020", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1695020" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-0217", "url": "https://www.cve.org/CVERecord?id=CVE-2019-0217" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0217", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0217" }, { "category": "external", "summary": "http://www.apache.org/dist/httpd/CHANGES_2.4", "url": "http://www.apache.org/dist/httpd/CHANGES_2.4" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html", "url": "https://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2019-04-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-20T16:14:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. After installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3933" }, { "category": "workaround", "details": "This flaw only affects a threaded server configuration, so using the prefork MPM is an effective mitigation. In versions of httpd package shipped with Red Hat Enterprise Linux 7, the prefork MPM is the default configuration.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: mod_auth_digest: access control bypass due to race condition" }, { "cve": "CVE-2019-9511", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741860" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker can request a large amount of data by manipulating window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this queue can consume excess CPU, memory, or both, leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: large amount of data requests leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "There are no mitigations available for nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9511" }, { "category": "external", "summary": "RHBZ#1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9511", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9511" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-20T16:14:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. After installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3933" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: large amount of data requests leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9513", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735741" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker, using PRIORITY frames to flood the system, could cause excessive CPU usage and starvation of other clients. The largest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PRIORITY frames results in excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for packages nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9513" }, { "category": "external", "summary": "RHBZ#1735741", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735741" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9513", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9513" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9513", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9513" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nghttp2.org/blog/2019/08/19/nghttp2-v1-39-2/", "url": "https://nghttp2.org/blog/2019/08/19/nghttp2-v1-39-2/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-20T16:14:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. After installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3933" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PRIORITY frames results in excessive resource consumption" }, { "cve": "CVE-2019-9516", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741864" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker, sending a stream of header with a 0-length header name and a 0-length header value, could cause some implementations to allocate memory for these headers and keep the allocations alive until the session dies. The can consume excess memory, potentially leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: 0-length headers lead to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9516" }, { "category": "external", "summary": "RHBZ#1741864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741864" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9516", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9516" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9516", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9516" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://github.com/nghttp2/nghttp2/issues/1382#", "url": "https://github.com/nghttp2/nghttp2/issues/1382#" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-20T16:14:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. After installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3933" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: 0-length headers lead to denial of service" }, { "cve": "CVE-2019-9517", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741868" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in HTTP/2. An attacker can open a HTTP/2 window so the peer can send without constraint. The TCP window remains closed so the peer cannot write the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the server\u0027s queue is setup, the responses can consume excess memory, CPU, or both, potentially leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: request for large response leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "The package httpd versions as shipped with Red Hat Enterprise Linux 5, 6 and 7 are not affected by this issue as HTTP/2 support is not provided.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9517" }, { "category": "external", "summary": "RHBZ#1741868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741868" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9517", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9517" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9517", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9517" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-20T16:14:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. After installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3933" }, { "category": "workaround", "details": "The httpd version shipped with Red Hat Enterprise Linux 8 provides HTTP/2 support through mod_http2 package. While mod_http2 package is not updated, users can disable HTTP/2 support as mitigation action by executing the following steps:\n\n1. Stop httpd service:\n$ systemctl stop httpd\n\n2. Remove http/2 protocol support from configuration files:\n$ sed -i \u0027s/\\(h2\\)\\|\\(h2c\\)//g\u0027 \u003chttpd_config_file\u003e\n\n3. Validate configuration files to make sure all syntax is valid:\n$ apachectl configtest\n\n4. Restart httpd service:\n$ systemctl start httpd", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-63.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-48.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-brotli-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-debuginfo-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-brotli-devel-0:1.0.6-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-33.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-jansson-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-debuginfo-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-jansson-devel-0:2.11-20.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.12-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.46-22.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.46-22.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-16.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-33.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-4.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1-25.jbcs.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: request for large response leads to denial of service" } ] }
rhsa-2019:2950
Vulnerability from csaf_redhat
Published
2019-10-01 11:46
Modified
2025-07-31 11:46
Summary
Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.29 SP3 security update
Notes
Topic
Red Hat JBoss Core Services Pack Apache Server 2.4.29 Service Pack 3 packages for RHEL 6, RHEL 7, Microsoft Windows and Oracle Solaris are now available.
Red Hat Product Security has rated this release as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
This release adds the new Apache HTTP Server 2.4.29 Service Pack 3 packages that are part of the JBoss Core Services offering.
This release serves as a replacement for Red Hat JBoss Core Services Apache HTTP Server 2.4.29 SP2, and includes security and bug fixes. Refer to the Release Notes for information on the component upgrades included in this release.
Security Fix(es):
* mod_http2: HTTP/2: 0-length headers leads to denial of service (CVE-2019-9516)
* mod_http2: HTTP/2: request for large response leads to denial of service (CVE-2019-9517)
Bug Fix(es):
* nghttp2: Rebase to 1.39.2
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat JBoss Core Services Pack Apache Server 2.4.29 Service Pack 3 packages for RHEL 6, RHEL 7, Microsoft Windows and Oracle Solaris are now available.\n\nRed Hat Product Security has rated this release as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "This release adds the new Apache HTTP Server 2.4.29 Service Pack 3 packages that are part of the JBoss Core Services offering.\n\nThis release serves as a replacement for Red Hat JBoss Core Services Apache HTTP Server 2.4.29 SP2, and includes security and bug fixes. Refer to the Release Notes for information on the component upgrades included in this release.\n\nSecurity Fix(es):\n\n* mod_http2: HTTP/2: 0-length headers leads to denial of service (CVE-2019-9516)\n\n* mod_http2: HTTP/2: request for large response leads to denial of service (CVE-2019-9517)\n\nBug Fix(es):\n\n* nghttp2: Rebase to 1.39.2\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:2950", "url": "https://access.redhat.com/errata/RHSA-2019:2950" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=core.service.apachehttp\u0026downloadType=securityPatches\u0026version=2.4.29", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=core.service.apachehttp\u0026downloadType=securityPatches\u0026version=2.4.29" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_jboss_core_services/2.4.29/html/red_hat_jboss_core_services_apache_http_server_2.4.29_service_pack_3_release_notes/index", "url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_core_services/2.4.29/html/red_hat_jboss_core_services_apache_http_server_2.4.29_service_pack_3_release_notes/index" }, { "category": "external", "summary": "1741864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741864" }, { "category": "external", "summary": "1741868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741868" }, { "category": "external", "summary": "JBCS-828", "url": "https://issues.redhat.com/browse/JBCS-828" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2950.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.29 SP3 security update", "tracking": { "current_release_date": "2025-07-31T11:46:24+00:00", "generator": { "date": "2025-07-31T11:46:24+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2019:2950", "initial_release_date": "2019-10-01T11:46:03+00:00", "revision_history": [ { "date": "2019-10-01T11:46:03+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-10-01T11:46:03+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-07-31T11:46:24+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Text-Only JBCS", "product": { "name": "Text-Only JBCS", "product_id": "Text-Only JBCS", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_core_services:1" } } } ], "category": "product_family", "name": "Red Hat JBoss Core Services" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-9516", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741864" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker, sending a stream of header with a 0-length header name and a 0-length header value, could cause some implementations to allocate memory for these headers and keep the allocations alive until the session dies. The can consume excess memory, potentially leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: 0-length headers lead to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only JBCS" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9516" }, { "category": "external", "summary": "RHBZ#1741864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741864" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9516", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9516" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9516", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9516" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://github.com/nghttp2/nghttp2/issues/1382#", "url": "https://github.com/nghttp2/nghttp2/issues/1382#" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-01T11:46:03+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Text-Only JBCS" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2950" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "Text-Only JBCS" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Text-Only JBCS" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: 0-length headers lead to denial of service" }, { "cve": "CVE-2019-9517", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741868" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in HTTP/2. An attacker can open a HTTP/2 window so the peer can send without constraint. The TCP window remains closed so the peer cannot write the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the server\u0027s queue is setup, the responses can consume excess memory, CPU, or both, potentially leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: request for large response leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "The package httpd versions as shipped with Red Hat Enterprise Linux 5, 6 and 7 are not affected by this issue as HTTP/2 support is not provided.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only JBCS" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9517" }, { "category": "external", "summary": "RHBZ#1741868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741868" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9517", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9517" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9517", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9517" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-01T11:46:03+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Text-Only JBCS" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2950" }, { "category": "workaround", "details": "The httpd version shipped with Red Hat Enterprise Linux 8 provides HTTP/2 support through mod_http2 package. While mod_http2 package is not updated, users can disable HTTP/2 support as mitigation action by executing the following steps:\n\n1. Stop httpd service:\n$ systemctl stop httpd\n\n2. Remove http/2 protocol support from configuration files:\n$ sed -i \u0027s/\\(h2\\)\\|\\(h2c\\)//g\u0027 \u003chttpd_config_file\u003e\n\n3. Validate configuration files to make sure all syntax is valid:\n$ apachectl configtest\n\n4. Restart httpd service:\n$ systemctl start httpd", "product_ids": [ "Text-Only JBCS" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Text-Only JBCS" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: request for large response leads to denial of service" } ] }
rhsa-2019:2939
Vulnerability from csaf_redhat
Published
2019-10-01 10:03
Modified
2025-08-07 09:55
Summary
Red Hat Security Advisory: rh-nodejs10-nodejs security update
Notes
Topic
An update for rh-nodejs10-nodejs is now available for Red Hat Software Collections.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: rh-nodejs10-nodejs (10.16.3).
Security Fix(es):
* HTTP/2: large amount of data requests leads to denial of service (CVE-2019-9511)
* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)
* HTTP/2: flood using PRIORITY frames results in excessive resource consumption (CVE-2019-9513)
* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)
* HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)
* HTTP/2: 0-length headers lead to denial of service (CVE-2019-9516)
* HTTP/2: request for large response leads to denial of service (CVE-2019-9517)
* HTTP/2: flood using empty frames results in excessive resource consumption (CVE-2019-9518)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for rh-nodejs10-nodejs is now available for Red Hat Software Collections.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.\n\nThe following packages have been upgraded to a later upstream version: rh-nodejs10-nodejs (10.16.3).\n\nSecurity Fix(es):\n\n* HTTP/2: large amount of data requests leads to denial of service (CVE-2019-9511)\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using PRIORITY frames results in excessive resource consumption (CVE-2019-9513)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\n* HTTP/2: 0-length headers lead to denial of service (CVE-2019-9516)\n\n* HTTP/2: request for large response leads to denial of service (CVE-2019-9517)\n\n* HTTP/2: flood using empty frames results in excessive resource consumption (CVE-2019-9518)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:2939", "url": "https://access.redhat.com/errata/RHSA-2019:2939" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735741", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735741" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "1741864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741864" }, { "category": "external", "summary": "1741868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741868" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2939.json" } ], "title": "Red Hat Security Advisory: rh-nodejs10-nodejs security update", "tracking": { "current_release_date": "2025-08-07T09:55:59+00:00", "generator": { "date": "2025-08-07T09:55:59+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2019:2939", "initial_release_date": "2019-10-01T10:03:49+00:00", "revision_history": [ { "date": "2019-10-01T10:03:49+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-10-01T10:03:49+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-07T09:55:59+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } } ], "category": "product_family", "name": "Red Hat Software Collections" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "product": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "product_id": "rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-nodejs@10.16.3-3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "product": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "product_id": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-nodejs-devel@10.16.3-3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "product": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "product_id": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-npm@6.9.0-10.16.3.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "product": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "product_id": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-nodejs-debuginfo@10.16.3-3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs10-0:3.2-3.el7.ppc64le", "product": { "name": "rh-nodejs10-0:3.2-3.el7.ppc64le", "product_id": "rh-nodejs10-0:3.2-3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10@3.2-3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "product": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "product_id": "rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-runtime@3.2-3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "product": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "product_id": "rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-scldevel@3.2-3.el7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "product": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "product_id": "rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-nodejs@10.16.3-3.el7?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "product": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "product_id": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-nodejs-devel@10.16.3-3.el7?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "product": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "product_id": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-npm@6.9.0-10.16.3.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "product": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "product_id": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-nodejs-debuginfo@10.16.3-3.el7?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs10-0:3.2-3.el7.s390x", "product": { "name": "rh-nodejs10-0:3.2-3.el7.s390x", "product_id": "rh-nodejs10-0:3.2-3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10@3.2-3.el7?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs10-runtime-0:3.2-3.el7.s390x", "product": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.s390x", "product_id": "rh-nodejs10-runtime-0:3.2-3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-runtime@3.2-3.el7?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "product": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "product_id": "rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-scldevel@3.2-3.el7?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "product": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "product_id": "rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-nodejs@10.16.3-3.el7?arch=aarch64" } } }, { "category": "product_version", "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "product": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "product_id": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-nodejs-devel@10.16.3-3.el7?arch=aarch64" } } }, { "category": "product_version", "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "product": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "product_id": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-npm@6.9.0-10.16.3.3.el7?arch=aarch64" } } }, { "category": "product_version", "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "product": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "product_id": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-nodejs-debuginfo@10.16.3-3.el7?arch=aarch64" } } }, { "category": "product_version", "name": "rh-nodejs10-0:3.2-3.el7.aarch64", "product": { "name": "rh-nodejs10-0:3.2-3.el7.aarch64", "product_id": "rh-nodejs10-0:3.2-3.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10@3.2-3.el7?arch=aarch64" } } }, { "category": "product_version", "name": "rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "product": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "product_id": "rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-runtime@3.2-3.el7?arch=aarch64" } } }, { "category": "product_version", "name": "rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "product": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "product_id": "rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-scldevel@3.2-3.el7?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "product": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "product_id": "rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-nodejs@10.16.3-3.el7?arch=src" } } }, { "category": "product_version", "name": "rh-nodejs10-0:3.2-3.el7.src", "product": { "name": "rh-nodejs10-0:3.2-3.el7.src", "product_id": "rh-nodejs10-0:3.2-3.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10@3.2-3.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "product": { "name": "rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "product_id": "rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-nodejs-docs@10.16.3-3.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "product": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "product_id": "rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-nodejs@10.16.3-3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "product": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "product_id": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-nodejs-devel@10.16.3-3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "product": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "product_id": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-npm@6.9.0-10.16.3.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "product": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "product_id": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-nodejs-debuginfo@10.16.3-3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs10-0:3.2-3.el7.x86_64", "product": { "name": "rh-nodejs10-0:3.2-3.el7.x86_64", "product_id": "rh-nodejs10-0:3.2-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10@3.2-3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "product": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "product_id": "rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-runtime@3.2-3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "product": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "product_id": "rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-scldevel@3.2-3.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.src", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch" }, "product_reference": "rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch" }, "product_reference": "rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch" }, "product_reference": "rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch" }, "product_reference": "rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch" }, "product_reference": "rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.src", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch" }, "product_reference": "rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-12121", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2018-11-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1661002" } ], "notes": [ { "category": "description", "text": "Node.js: All versions prior to Node.js 6.15.0, 8.14.0, 10.14.0 and 11.3.0: Denial of Service with large HTTP headers: By using a combination of many requests with maximum sized headers (almost 80 KB per connection), and carefully timed completion of the headers, it is possible to cause the HTTP server to abort from heap allocation failure. Attack potential is mitigated by the use of a load balancer or other proxy layer.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: Denial of Service with large HTTP headers", "title": "Vulnerability summary" }, { "category": "other", "text": "The nodejs RPMs shipped in Red Hat OpenShift Container Platform (OCP) versions 3.6 through 3.10 are vulnerable to this flaw because they contain the affected code. Later versions of OCP used nodejs RPMs delivered from Red Hat Software Collections and Red Hat Enterprise Linux channels.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-12121" }, { "category": "external", "summary": "RHBZ#1661002", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1661002" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-12121", "url": "https://www.cve.org/CVERecord?id=CVE-2018-12121" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12121", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12121" } ], "release_date": "2018-11-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-01T10:03:49+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2939" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs: Denial of Service with large HTTP headers" }, { "cve": "CVE-2018-12122", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2018-11-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1661005" } ], "notes": [ { "category": "description", "text": "It was found that Node.js HTTP server was vulnerable to a Slowloris type attack. An attacker could make long lived connections by sending bytes very slowly to the server, saturating its resource and possibly resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: Slowloris HTTP Denial of Service", "title": "Vulnerability summary" }, { "category": "other", "text": "The nodejs RPMs shipped in Red Hat OpenShift Container Platform (OCP) versions 3.6 through 3.10 are vulnerable to this flaw because they contain the affected code. Later versions of OCP used nodejs RPMs delivered from Red Hat Software Collections and Red Hat Enterprise Linux channels.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-12122" }, { "category": "external", "summary": "RHBZ#1661005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1661005" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-12122", "url": "https://www.cve.org/CVERecord?id=CVE-2018-12122" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12122", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12122" } ], "release_date": "2018-11-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-01T10:03:49+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2939" }, { "category": "workaround", "details": "The use of a Load Balancer or a Reverse Proxy will increase the difficulty of the attack.", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "nodejs: Slowloris HTTP Denial of Service" }, { "cve": "CVE-2018-12123", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2018-11-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1661010" } ], "notes": [ { "category": "description", "text": "Node.js: All versions prior to Node.js 6.15.0, 8.14.0, 10.14.0 and 11.3.0: Hostname spoofing in URL parser for javascript protocol: If a Node.js application is using url.parse() to determine the URL hostname, that hostname can be spoofed by using a mixed case \"javascript:\" (e.g. \"javAscript:\") protocol (other protocols are not affected). If security decisions are made about the URL based on the hostname, they may be incorrect.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: Hostname spoofing in URL parser for javascript protocol", "title": "Vulnerability summary" }, { "category": "other", "text": "The nodejs RPMs shipped in Red Hat OpenShift Container Platform (OCP) versions 3.6 through 3.10 are vulnerable to this flaw because they contain the affected code. Later versions of OCP used nodejs RPMs delivered from Red Hat Software Collections and Red Hat Enterprise Linux channels.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-12123" }, { "category": "external", "summary": "RHBZ#1661010", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1661010" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-12123", "url": "https://www.cve.org/CVERecord?id=CVE-2018-12123" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12123", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12123" } ], "release_date": "2018-11-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-01T10:03:49+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2939" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "nodejs: Hostname spoofing in URL parser for javascript protocol" }, { "cve": "CVE-2019-5737", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-03-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1690808" } ], "notes": [ { "category": "description", "text": "It was found that the original fix for Slowloris, CVE-2018-12122, was insufficient. It is possible to bypass the server\u0027s headersTimeout by sending two specially crafted HTTP requests in the same connection. An attacker could use this flaw to bypass Slowloris protection, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: Insufficient Slowloris fix causing DoS via server.headersTimeout bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-5737" }, { "category": "external", "summary": "RHBZ#1690808", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1690808" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-5737", "url": "https://www.cve.org/CVERecord?id=CVE-2019-5737" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-5737", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5737" }, { "category": "external", "summary": "https://nodejs.org/ja/blog/vulnerability/february-2019-security-releases/", "url": "https://nodejs.org/ja/blog/vulnerability/february-2019-security-releases/" } ], "release_date": "2019-02-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-01T10:03:49+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2939" }, { "category": "workaround", "details": "The use of a Load Balancer or a Reverse Proxy will increase the difficulty of the attack.", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "nodejs: Insufficient Slowloris fix causing DoS via server.headersTimeout bypass" }, { "cve": "CVE-2019-9511", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741860" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker can request a large amount of data by manipulating window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this queue can consume excess CPU, memory, or both, leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: large amount of data requests leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "There are no mitigations available for nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9511" }, { "category": "external", "summary": "RHBZ#1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9511", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9511" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-01T10:03:49+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2939" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: large amount of data requests leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-01T10:03:49+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2939" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9513", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735741" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker, using PRIORITY frames to flood the system, could cause excessive CPU usage and starvation of other clients. The largest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PRIORITY frames results in excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for packages nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9513" }, { "category": "external", "summary": "RHBZ#1735741", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735741" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9513", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9513" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9513", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9513" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nghttp2.org/blog/2019/08/19/nghttp2-v1-39-2/", "url": "https://nghttp2.org/blog/2019/08/19/nghttp2-v1-39-2/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-01T10:03:49+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2939" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PRIORITY frames results in excessive resource consumption" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-01T10:03:49+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2939" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-01T10:03:49+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2939" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "cve": "CVE-2019-9516", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741864" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker, sending a stream of header with a 0-length header name and a 0-length header value, could cause some implementations to allocate memory for these headers and keep the allocations alive until the session dies. The can consume excess memory, potentially leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: 0-length headers lead to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9516" }, { "category": "external", "summary": "RHBZ#1741864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741864" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9516", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9516" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9516", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9516" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://github.com/nghttp2/nghttp2/issues/1382#", "url": "https://github.com/nghttp2/nghttp2/issues/1382#" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-01T10:03:49+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2939" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: 0-length headers lead to denial of service" }, { "cve": "CVE-2019-9517", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741868" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in HTTP/2. An attacker can open a HTTP/2 window so the peer can send without constraint. The TCP window remains closed so the peer cannot write the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the server\u0027s queue is setup, the responses can consume excess memory, CPU, or both, potentially leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: request for large response leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "The package httpd versions as shipped with Red Hat Enterprise Linux 5, 6 and 7 are not affected by this issue as HTTP/2 support is not provided.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9517" }, { "category": "external", "summary": "RHBZ#1741868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741868" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9517", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9517" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9517", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9517" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-01T10:03:49+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2939" }, { "category": "workaround", "details": "The httpd version shipped with Red Hat Enterprise Linux 8 provides HTTP/2 support through mod_http2 package. While mod_http2 package is not updated, users can disable HTTP/2 support as mitigation action by executing the following steps:\n\n1. Stop httpd service:\n$ systemctl stop httpd\n\n2. Remove http/2 protocol support from configuration files:\n$ sed -i \u0027s/\\(h2\\)\\|\\(h2c\\)//g\u0027 \u003chttpd_config_file\u003e\n\n3. Validate configuration files to make sure all syntax is valid:\n$ apachectl configtest\n\n4. Restart httpd service:\n$ systemctl start httpd", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: request for large response leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9518", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735749" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using frames with an empty payload, a flood could occur that results in excessive CPU usage and starvation of other clients. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using empty frames results in excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9518" }, { "category": "external", "summary": "RHBZ#1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9518", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9518" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-01T10:03:49+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2939" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using empty frames results in excessive resource consumption" } ] }
rhsa-2019:2949
Vulnerability from csaf_redhat
Published
2019-10-01 16:14
Modified
2025-07-31 11:46
Summary
Red Hat Security Advisory: httpd24-httpd and httpd24-nghttp2 security update
Notes
Topic
An update for httpd24-httpd and httpd24-nghttp2 is now available for Red Hat Software Collections.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* HTTP/2: large amount of data requests leads to denial of service (CVE-2019-9511)
* HTTP/2: flood using PRIORITY frames resulting in excessive resource consumption (CVE-2019-9513)
* HTTP/2: request for large response leads to denial of service (CVE-2019-9517)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for httpd24-httpd and httpd24-nghttp2 is now available for Red Hat Software Collections.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* HTTP/2: large amount of data requests leads to denial of service (CVE-2019-9511)\n\n* HTTP/2: flood using PRIORITY frames resulting in excessive resource consumption (CVE-2019-9513)\n\n* HTTP/2: request for large response leads to denial of service (CVE-2019-9517)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:2949", "url": "https://access.redhat.com/errata/RHSA-2019:2949" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1735741", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735741" }, { "category": "external", "summary": "1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "1741868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741868" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2949.json" } ], "title": "Red Hat Security Advisory: httpd24-httpd and httpd24-nghttp2 security update", "tracking": { "current_release_date": "2025-07-31T11:46:16+00:00", "generator": { "date": "2025-07-31T11:46:16+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2019:2949", "initial_release_date": "2019-10-01T16:14:19+00:00", "revision_history": [ { "date": "2019-10-01T16:14:19+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-10-01T16:14:19+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-07-31T11:46:16+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-3.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el6" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-3.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el6" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } } ], "category": "product_family", "name": "Red Hat Software Collections" }, { "branches": [ { "category": "product_version", "name": "httpd24-libnghttp2-0:1.7.1-7.el6.1.x86_64", "product": { "name": "httpd24-libnghttp2-0:1.7.1-7.el6.1.x86_64", "product_id": "httpd24-libnghttp2-0:1.7.1-7.el6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-libnghttp2@1.7.1-7.el6.1?arch=x86_64" } } }, { "category": "product_version", "name": "httpd24-libnghttp2-devel-0:1.7.1-7.el6.1.x86_64", "product": { "name": "httpd24-libnghttp2-devel-0:1.7.1-7.el6.1.x86_64", "product_id": "httpd24-libnghttp2-devel-0:1.7.1-7.el6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-libnghttp2-devel@1.7.1-7.el6.1?arch=x86_64" } } }, { "category": "product_version", "name": "httpd24-nghttp2-0:1.7.1-7.el6.1.x86_64", "product": { "name": "httpd24-nghttp2-0:1.7.1-7.el6.1.x86_64", "product_id": "httpd24-nghttp2-0:1.7.1-7.el6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-nghttp2@1.7.1-7.el6.1?arch=x86_64" } } }, { "category": "product_version", "name": "httpd24-nghttp2-debuginfo-0:1.7.1-7.el6.1.x86_64", "product": { "name": "httpd24-nghttp2-debuginfo-0:1.7.1-7.el6.1.x86_64", "product_id": "httpd24-nghttp2-debuginfo-0:1.7.1-7.el6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-nghttp2-debuginfo@1.7.1-7.el6.1?arch=x86_64" } } }, { "category": "product_version", "name": "httpd24-httpd-0:2.4.34-8.el6.1.x86_64", "product": { "name": "httpd24-httpd-0:2.4.34-8.el6.1.x86_64", "product_id": "httpd24-httpd-0:2.4.34-8.el6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd@2.4.34-8.el6.1?arch=x86_64" } } }, { "category": "product_version", "name": "httpd24-httpd-devel-0:2.4.34-8.el6.1.x86_64", "product": { "name": "httpd24-httpd-devel-0:2.4.34-8.el6.1.x86_64", "product_id": "httpd24-httpd-devel-0:2.4.34-8.el6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd-devel@2.4.34-8.el6.1?arch=x86_64" } } }, { "category": "product_version", "name": "httpd24-httpd-tools-0:2.4.34-8.el6.1.x86_64", "product": { "name": "httpd24-httpd-tools-0:2.4.34-8.el6.1.x86_64", "product_id": "httpd24-httpd-tools-0:2.4.34-8.el6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd-tools@2.4.34-8.el6.1?arch=x86_64" } } }, { "category": "product_version", "name": "httpd24-mod_ldap-0:2.4.34-8.el6.1.x86_64", "product": { "name": "httpd24-mod_ldap-0:2.4.34-8.el6.1.x86_64", "product_id": "httpd24-mod_ldap-0:2.4.34-8.el6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_ldap@2.4.34-8.el6.1?arch=x86_64" } } }, { "category": "product_version", "name": "httpd24-mod_proxy_html-1:2.4.34-8.el6.1.x86_64", "product": { "name": "httpd24-mod_proxy_html-1:2.4.34-8.el6.1.x86_64", "product_id": "httpd24-mod_proxy_html-1:2.4.34-8.el6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_proxy_html@2.4.34-8.el6.1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd24-mod_session-0:2.4.34-8.el6.1.x86_64", "product": { "name": "httpd24-mod_session-0:2.4.34-8.el6.1.x86_64", "product_id": "httpd24-mod_session-0:2.4.34-8.el6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_session@2.4.34-8.el6.1?arch=x86_64" } } }, { "category": "product_version", "name": "httpd24-mod_ssl-1:2.4.34-8.el6.1.x86_64", "product": { "name": "httpd24-mod_ssl-1:2.4.34-8.el6.1.x86_64", "product_id": "httpd24-mod_ssl-1:2.4.34-8.el6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_ssl@2.4.34-8.el6.1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd24-httpd-debuginfo-0:2.4.34-8.el6.1.x86_64", "product": { "name": "httpd24-httpd-debuginfo-0:2.4.34-8.el6.1.x86_64", "product_id": "httpd24-httpd-debuginfo-0:2.4.34-8.el6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd-debuginfo@2.4.34-8.el6.1?arch=x86_64" } } }, { "category": "product_version", "name": "httpd24-libnghttp2-0:1.7.1-7.el7.1.x86_64", "product": { "name": "httpd24-libnghttp2-0:1.7.1-7.el7.1.x86_64", "product_id": "httpd24-libnghttp2-0:1.7.1-7.el7.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-libnghttp2@1.7.1-7.el7.1?arch=x86_64" } } }, { "category": "product_version", "name": "httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.x86_64", "product": { "name": "httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.x86_64", "product_id": "httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-libnghttp2-devel@1.7.1-7.el7.1?arch=x86_64" } } }, { "category": "product_version", "name": "httpd24-nghttp2-0:1.7.1-7.el7.1.x86_64", "product": { "name": "httpd24-nghttp2-0:1.7.1-7.el7.1.x86_64", "product_id": "httpd24-nghttp2-0:1.7.1-7.el7.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-nghttp2@1.7.1-7.el7.1?arch=x86_64" } } }, { "category": "product_version", "name": "httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.x86_64", "product": { "name": "httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.x86_64", "product_id": "httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-nghttp2-debuginfo@1.7.1-7.el7.1?arch=x86_64" } } }, { "category": "product_version", "name": "httpd24-httpd-0:2.4.34-8.el7.1.x86_64", "product": { "name": "httpd24-httpd-0:2.4.34-8.el7.1.x86_64", "product_id": "httpd24-httpd-0:2.4.34-8.el7.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd@2.4.34-8.el7.1?arch=x86_64" } } }, { "category": "product_version", "name": "httpd24-httpd-devel-0:2.4.34-8.el7.1.x86_64", "product": { "name": "httpd24-httpd-devel-0:2.4.34-8.el7.1.x86_64", "product_id": "httpd24-httpd-devel-0:2.4.34-8.el7.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd-devel@2.4.34-8.el7.1?arch=x86_64" } } }, { "category": "product_version", "name": "httpd24-httpd-tools-0:2.4.34-8.el7.1.x86_64", "product": { "name": "httpd24-httpd-tools-0:2.4.34-8.el7.1.x86_64", "product_id": "httpd24-httpd-tools-0:2.4.34-8.el7.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd-tools@2.4.34-8.el7.1?arch=x86_64" } } }, { "category": "product_version", "name": "httpd24-mod_ldap-0:2.4.34-8.el7.1.x86_64", "product": { "name": "httpd24-mod_ldap-0:2.4.34-8.el7.1.x86_64", "product_id": "httpd24-mod_ldap-0:2.4.34-8.el7.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_ldap@2.4.34-8.el7.1?arch=x86_64" } } }, { "category": "product_version", "name": "httpd24-mod_md-0:2.4.34-8.el7.1.x86_64", "product": { "name": "httpd24-mod_md-0:2.4.34-8.el7.1.x86_64", "product_id": "httpd24-mod_md-0:2.4.34-8.el7.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_md@2.4.34-8.el7.1?arch=x86_64" } } }, { "category": "product_version", "name": "httpd24-mod_proxy_html-1:2.4.34-8.el7.1.x86_64", "product": { "name": "httpd24-mod_proxy_html-1:2.4.34-8.el7.1.x86_64", "product_id": "httpd24-mod_proxy_html-1:2.4.34-8.el7.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_proxy_html@2.4.34-8.el7.1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd24-mod_session-0:2.4.34-8.el7.1.x86_64", "product": { "name": "httpd24-mod_session-0:2.4.34-8.el7.1.x86_64", "product_id": "httpd24-mod_session-0:2.4.34-8.el7.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_session@2.4.34-8.el7.1?arch=x86_64" } } }, { "category": "product_version", "name": "httpd24-mod_ssl-1:2.4.34-8.el7.1.x86_64", "product": { "name": "httpd24-mod_ssl-1:2.4.34-8.el7.1.x86_64", "product_id": "httpd24-mod_ssl-1:2.4.34-8.el7.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_ssl@2.4.34-8.el7.1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.x86_64", "product": { "name": "httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.x86_64", "product_id": "httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd-debuginfo@2.4.34-8.el7.1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "httpd24-nghttp2-0:1.7.1-7.el6.1.src", "product": { "name": "httpd24-nghttp2-0:1.7.1-7.el6.1.src", "product_id": "httpd24-nghttp2-0:1.7.1-7.el6.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-nghttp2@1.7.1-7.el6.1?arch=src" } } }, { "category": "product_version", "name": "httpd24-httpd-0:2.4.34-8.el6.1.src", "product": { "name": "httpd24-httpd-0:2.4.34-8.el6.1.src", "product_id": "httpd24-httpd-0:2.4.34-8.el6.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd@2.4.34-8.el6.1?arch=src" } } }, { "category": "product_version", "name": "httpd24-nghttp2-0:1.7.1-7.el7.1.src", "product": { "name": "httpd24-nghttp2-0:1.7.1-7.el7.1.src", "product_id": "httpd24-nghttp2-0:1.7.1-7.el7.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-nghttp2@1.7.1-7.el7.1?arch=src" } } }, { "category": "product_version", "name": "httpd24-httpd-0:2.4.34-8.el7.1.src", "product": { "name": "httpd24-httpd-0:2.4.34-8.el7.1.src", "product_id": "httpd24-httpd-0:2.4.34-8.el7.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd@2.4.34-8.el7.1?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "httpd24-httpd-manual-0:2.4.34-8.el6.1.noarch", "product": { "name": "httpd24-httpd-manual-0:2.4.34-8.el6.1.noarch", "product_id": "httpd24-httpd-manual-0:2.4.34-8.el6.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd-manual@2.4.34-8.el6.1?arch=noarch" } } }, { "category": "product_version", "name": "httpd24-httpd-manual-0:2.4.34-8.el7.1.noarch", "product": { "name": "httpd24-httpd-manual-0:2.4.34-8.el7.1.noarch", "product_id": "httpd24-httpd-manual-0:2.4.34-8.el7.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd-manual@2.4.34-8.el7.1?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "httpd24-libnghttp2-0:1.7.1-7.el7.1.ppc64le", "product": { "name": "httpd24-libnghttp2-0:1.7.1-7.el7.1.ppc64le", "product_id": "httpd24-libnghttp2-0:1.7.1-7.el7.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-libnghttp2@1.7.1-7.el7.1?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.ppc64le", "product": { "name": "httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.ppc64le", "product_id": "httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-libnghttp2-devel@1.7.1-7.el7.1?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd24-nghttp2-0:1.7.1-7.el7.1.ppc64le", "product": { "name": "httpd24-nghttp2-0:1.7.1-7.el7.1.ppc64le", "product_id": "httpd24-nghttp2-0:1.7.1-7.el7.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-nghttp2@1.7.1-7.el7.1?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.ppc64le", "product": { "name": "httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.ppc64le", "product_id": "httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-nghttp2-debuginfo@1.7.1-7.el7.1?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd24-httpd-0:2.4.34-8.el7.1.ppc64le", "product": { "name": "httpd24-httpd-0:2.4.34-8.el7.1.ppc64le", "product_id": "httpd24-httpd-0:2.4.34-8.el7.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd@2.4.34-8.el7.1?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd24-httpd-devel-0:2.4.34-8.el7.1.ppc64le", "product": { "name": "httpd24-httpd-devel-0:2.4.34-8.el7.1.ppc64le", "product_id": "httpd24-httpd-devel-0:2.4.34-8.el7.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd-devel@2.4.34-8.el7.1?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd24-httpd-tools-0:2.4.34-8.el7.1.ppc64le", "product": { "name": "httpd24-httpd-tools-0:2.4.34-8.el7.1.ppc64le", "product_id": "httpd24-httpd-tools-0:2.4.34-8.el7.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd-tools@2.4.34-8.el7.1?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd24-mod_ldap-0:2.4.34-8.el7.1.ppc64le", "product": { "name": "httpd24-mod_ldap-0:2.4.34-8.el7.1.ppc64le", "product_id": "httpd24-mod_ldap-0:2.4.34-8.el7.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_ldap@2.4.34-8.el7.1?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd24-mod_md-0:2.4.34-8.el7.1.ppc64le", "product": { "name": "httpd24-mod_md-0:2.4.34-8.el7.1.ppc64le", "product_id": "httpd24-mod_md-0:2.4.34-8.el7.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_md@2.4.34-8.el7.1?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd24-mod_proxy_html-1:2.4.34-8.el7.1.ppc64le", "product": { "name": "httpd24-mod_proxy_html-1:2.4.34-8.el7.1.ppc64le", "product_id": "httpd24-mod_proxy_html-1:2.4.34-8.el7.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_proxy_html@2.4.34-8.el7.1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd24-mod_session-0:2.4.34-8.el7.1.ppc64le", "product": { "name": "httpd24-mod_session-0:2.4.34-8.el7.1.ppc64le", "product_id": "httpd24-mod_session-0:2.4.34-8.el7.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_session@2.4.34-8.el7.1?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd24-mod_ssl-1:2.4.34-8.el7.1.ppc64le", "product": { "name": "httpd24-mod_ssl-1:2.4.34-8.el7.1.ppc64le", "product_id": "httpd24-mod_ssl-1:2.4.34-8.el7.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_ssl@2.4.34-8.el7.1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.ppc64le", "product": { "name": "httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.ppc64le", "product_id": "httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd-debuginfo@2.4.34-8.el7.1?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "httpd24-libnghttp2-0:1.7.1-7.el7.1.s390x", "product": { "name": "httpd24-libnghttp2-0:1.7.1-7.el7.1.s390x", "product_id": "httpd24-libnghttp2-0:1.7.1-7.el7.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-libnghttp2@1.7.1-7.el7.1?arch=s390x" } } }, { "category": "product_version", "name": "httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.s390x", "product": { "name": "httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.s390x", "product_id": "httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-libnghttp2-devel@1.7.1-7.el7.1?arch=s390x" } } }, { "category": "product_version", "name": "httpd24-nghttp2-0:1.7.1-7.el7.1.s390x", "product": { "name": "httpd24-nghttp2-0:1.7.1-7.el7.1.s390x", "product_id": "httpd24-nghttp2-0:1.7.1-7.el7.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-nghttp2@1.7.1-7.el7.1?arch=s390x" } } }, { "category": "product_version", "name": "httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.s390x", "product": { "name": "httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.s390x", "product_id": "httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-nghttp2-debuginfo@1.7.1-7.el7.1?arch=s390x" } } }, { "category": "product_version", "name": "httpd24-httpd-0:2.4.34-8.el7.1.s390x", "product": { "name": "httpd24-httpd-0:2.4.34-8.el7.1.s390x", "product_id": "httpd24-httpd-0:2.4.34-8.el7.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd@2.4.34-8.el7.1?arch=s390x" } } }, { "category": "product_version", "name": "httpd24-httpd-devel-0:2.4.34-8.el7.1.s390x", "product": { "name": "httpd24-httpd-devel-0:2.4.34-8.el7.1.s390x", "product_id": "httpd24-httpd-devel-0:2.4.34-8.el7.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd-devel@2.4.34-8.el7.1?arch=s390x" } } }, { "category": "product_version", "name": "httpd24-httpd-tools-0:2.4.34-8.el7.1.s390x", "product": { "name": "httpd24-httpd-tools-0:2.4.34-8.el7.1.s390x", "product_id": "httpd24-httpd-tools-0:2.4.34-8.el7.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd-tools@2.4.34-8.el7.1?arch=s390x" } } }, { "category": "product_version", "name": "httpd24-mod_ldap-0:2.4.34-8.el7.1.s390x", "product": { "name": "httpd24-mod_ldap-0:2.4.34-8.el7.1.s390x", "product_id": "httpd24-mod_ldap-0:2.4.34-8.el7.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_ldap@2.4.34-8.el7.1?arch=s390x" } } }, { "category": "product_version", "name": "httpd24-mod_md-0:2.4.34-8.el7.1.s390x", "product": { "name": "httpd24-mod_md-0:2.4.34-8.el7.1.s390x", "product_id": "httpd24-mod_md-0:2.4.34-8.el7.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_md@2.4.34-8.el7.1?arch=s390x" } } }, { "category": "product_version", "name": "httpd24-mod_proxy_html-1:2.4.34-8.el7.1.s390x", "product": { "name": "httpd24-mod_proxy_html-1:2.4.34-8.el7.1.s390x", "product_id": "httpd24-mod_proxy_html-1:2.4.34-8.el7.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_proxy_html@2.4.34-8.el7.1?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd24-mod_session-0:2.4.34-8.el7.1.s390x", "product": { "name": "httpd24-mod_session-0:2.4.34-8.el7.1.s390x", "product_id": "httpd24-mod_session-0:2.4.34-8.el7.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_session@2.4.34-8.el7.1?arch=s390x" } } }, { "category": "product_version", "name": "httpd24-mod_ssl-1:2.4.34-8.el7.1.s390x", "product": { "name": "httpd24-mod_ssl-1:2.4.34-8.el7.1.s390x", "product_id": "httpd24-mod_ssl-1:2.4.34-8.el7.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_ssl@2.4.34-8.el7.1?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.s390x", "product": { "name": "httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.s390x", "product_id": "httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd-debuginfo@2.4.34-8.el7.1?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "httpd24-libnghttp2-0:1.7.1-7.el7.1.aarch64", "product": { "name": "httpd24-libnghttp2-0:1.7.1-7.el7.1.aarch64", "product_id": "httpd24-libnghttp2-0:1.7.1-7.el7.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-libnghttp2@1.7.1-7.el7.1?arch=aarch64" } } }, { "category": "product_version", "name": "httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.aarch64", "product": { "name": "httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.aarch64", "product_id": "httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-libnghttp2-devel@1.7.1-7.el7.1?arch=aarch64" } } }, { "category": "product_version", "name": "httpd24-nghttp2-0:1.7.1-7.el7.1.aarch64", "product": { "name": "httpd24-nghttp2-0:1.7.1-7.el7.1.aarch64", "product_id": "httpd24-nghttp2-0:1.7.1-7.el7.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-nghttp2@1.7.1-7.el7.1?arch=aarch64" } } }, { "category": "product_version", "name": "httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.aarch64", "product": { "name": "httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.aarch64", "product_id": "httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-nghttp2-debuginfo@1.7.1-7.el7.1?arch=aarch64" } } }, { "category": "product_version", "name": "httpd24-httpd-0:2.4.34-8.el7.1.aarch64", "product": { "name": "httpd24-httpd-0:2.4.34-8.el7.1.aarch64", "product_id": "httpd24-httpd-0:2.4.34-8.el7.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd@2.4.34-8.el7.1?arch=aarch64" } } }, { "category": "product_version", "name": "httpd24-httpd-devel-0:2.4.34-8.el7.1.aarch64", "product": { "name": "httpd24-httpd-devel-0:2.4.34-8.el7.1.aarch64", "product_id": "httpd24-httpd-devel-0:2.4.34-8.el7.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd-devel@2.4.34-8.el7.1?arch=aarch64" } } }, { "category": "product_version", "name": "httpd24-httpd-tools-0:2.4.34-8.el7.1.aarch64", "product": { "name": "httpd24-httpd-tools-0:2.4.34-8.el7.1.aarch64", "product_id": "httpd24-httpd-tools-0:2.4.34-8.el7.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd-tools@2.4.34-8.el7.1?arch=aarch64" } } }, { "category": "product_version", "name": "httpd24-mod_ldap-0:2.4.34-8.el7.1.aarch64", "product": { "name": "httpd24-mod_ldap-0:2.4.34-8.el7.1.aarch64", "product_id": "httpd24-mod_ldap-0:2.4.34-8.el7.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_ldap@2.4.34-8.el7.1?arch=aarch64" } } }, { "category": "product_version", "name": "httpd24-mod_md-0:2.4.34-8.el7.1.aarch64", "product": { "name": "httpd24-mod_md-0:2.4.34-8.el7.1.aarch64", "product_id": "httpd24-mod_md-0:2.4.34-8.el7.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_md@2.4.34-8.el7.1?arch=aarch64" } } }, { "category": "product_version", "name": "httpd24-mod_proxy_html-1:2.4.34-8.el7.1.aarch64", "product": { "name": "httpd24-mod_proxy_html-1:2.4.34-8.el7.1.aarch64", "product_id": "httpd24-mod_proxy_html-1:2.4.34-8.el7.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_proxy_html@2.4.34-8.el7.1?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd24-mod_session-0:2.4.34-8.el7.1.aarch64", "product": { "name": "httpd24-mod_session-0:2.4.34-8.el7.1.aarch64", "product_id": "httpd24-mod_session-0:2.4.34-8.el7.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_session@2.4.34-8.el7.1?arch=aarch64" } } }, { "category": "product_version", "name": "httpd24-mod_ssl-1:2.4.34-8.el7.1.aarch64", "product": { "name": "httpd24-mod_ssl-1:2.4.34-8.el7.1.aarch64", "product_id": "httpd24-mod_ssl-1:2.4.34-8.el7.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_ssl@2.4.34-8.el7.1?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.aarch64", "product": { "name": "httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.aarch64", "product_id": "httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd-debuginfo@2.4.34-8.el7.1?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.34-8.el6.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el6.1.src" }, "product_reference": "httpd24-httpd-0:2.4.34-8.el6.1.src", "relates_to_product_reference": "6Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.34-8.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el6.1.x86_64" }, "product_reference": "httpd24-httpd-0:2.4.34-8.el6.1.x86_64", "relates_to_product_reference": "6Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-debuginfo-0:2.4.34-8.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el6.1.x86_64" }, "product_reference": "httpd24-httpd-debuginfo-0:2.4.34-8.el6.1.x86_64", "relates_to_product_reference": "6Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-devel-0:2.4.34-8.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el6.1.x86_64" }, "product_reference": "httpd24-httpd-devel-0:2.4.34-8.el6.1.x86_64", "relates_to_product_reference": "6Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-manual-0:2.4.34-8.el6.1.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-3.3:httpd24-httpd-manual-0:2.4.34-8.el6.1.noarch" }, "product_reference": "httpd24-httpd-manual-0:2.4.34-8.el6.1.noarch", "relates_to_product_reference": "6Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-tools-0:2.4.34-8.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el6.1.x86_64" }, "product_reference": "httpd24-httpd-tools-0:2.4.34-8.el6.1.x86_64", "relates_to_product_reference": "6Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-libnghttp2-0:1.7.1-7.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el6.1.x86_64" }, "product_reference": "httpd24-libnghttp2-0:1.7.1-7.el6.1.x86_64", "relates_to_product_reference": "6Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-libnghttp2-devel-0:1.7.1-7.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el6.1.x86_64" }, "product_reference": "httpd24-libnghttp2-devel-0:1.7.1-7.el6.1.x86_64", "relates_to_product_reference": "6Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ldap-0:2.4.34-8.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el6.1.x86_64" }, "product_reference": "httpd24-mod_ldap-0:2.4.34-8.el6.1.x86_64", "relates_to_product_reference": "6Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_proxy_html-1:2.4.34-8.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el6.1.x86_64" }, "product_reference": "httpd24-mod_proxy_html-1:2.4.34-8.el6.1.x86_64", "relates_to_product_reference": "6Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_session-0:2.4.34-8.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el6.1.x86_64" }, "product_reference": "httpd24-mod_session-0:2.4.34-8.el6.1.x86_64", "relates_to_product_reference": "6Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ssl-1:2.4.34-8.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el6.1.x86_64" }, "product_reference": "httpd24-mod_ssl-1:2.4.34-8.el6.1.x86_64", "relates_to_product_reference": "6Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-0:1.7.1-7.el6.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el6.1.src" }, "product_reference": "httpd24-nghttp2-0:1.7.1-7.el6.1.src", "relates_to_product_reference": "6Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-0:1.7.1-7.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el6.1.x86_64" }, "product_reference": "httpd24-nghttp2-0:1.7.1-7.el6.1.x86_64", "relates_to_product_reference": "6Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-debuginfo-0:1.7.1-7.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el6.1.x86_64" }, "product_reference": "httpd24-nghttp2-debuginfo-0:1.7.1-7.el6.1.x86_64", "relates_to_product_reference": "6Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.34-8.el6.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el6.1.src" }, "product_reference": "httpd24-httpd-0:2.4.34-8.el6.1.src", "relates_to_product_reference": "6Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.34-8.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el6.1.x86_64" }, "product_reference": "httpd24-httpd-0:2.4.34-8.el6.1.x86_64", "relates_to_product_reference": "6Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-debuginfo-0:2.4.34-8.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el6.1.x86_64" }, "product_reference": "httpd24-httpd-debuginfo-0:2.4.34-8.el6.1.x86_64", "relates_to_product_reference": "6Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-devel-0:2.4.34-8.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el6.1.x86_64" }, "product_reference": "httpd24-httpd-devel-0:2.4.34-8.el6.1.x86_64", "relates_to_product_reference": "6Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-manual-0:2.4.34-8.el6.1.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-3.3:httpd24-httpd-manual-0:2.4.34-8.el6.1.noarch" }, "product_reference": "httpd24-httpd-manual-0:2.4.34-8.el6.1.noarch", "relates_to_product_reference": "6Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-tools-0:2.4.34-8.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el6.1.x86_64" }, "product_reference": "httpd24-httpd-tools-0:2.4.34-8.el6.1.x86_64", "relates_to_product_reference": "6Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-libnghttp2-0:1.7.1-7.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el6.1.x86_64" }, "product_reference": "httpd24-libnghttp2-0:1.7.1-7.el6.1.x86_64", "relates_to_product_reference": "6Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-libnghttp2-devel-0:1.7.1-7.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el6.1.x86_64" }, "product_reference": "httpd24-libnghttp2-devel-0:1.7.1-7.el6.1.x86_64", "relates_to_product_reference": "6Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ldap-0:2.4.34-8.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el6.1.x86_64" }, "product_reference": "httpd24-mod_ldap-0:2.4.34-8.el6.1.x86_64", "relates_to_product_reference": "6Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_proxy_html-1:2.4.34-8.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el6.1.x86_64" }, "product_reference": "httpd24-mod_proxy_html-1:2.4.34-8.el6.1.x86_64", "relates_to_product_reference": "6Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_session-0:2.4.34-8.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el6.1.x86_64" }, "product_reference": "httpd24-mod_session-0:2.4.34-8.el6.1.x86_64", "relates_to_product_reference": "6Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ssl-1:2.4.34-8.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el6.1.x86_64" }, "product_reference": "httpd24-mod_ssl-1:2.4.34-8.el6.1.x86_64", "relates_to_product_reference": "6Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-0:1.7.1-7.el6.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el6.1.src" }, "product_reference": "httpd24-nghttp2-0:1.7.1-7.el6.1.src", "relates_to_product_reference": "6Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-0:1.7.1-7.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el6.1.x86_64" }, "product_reference": "httpd24-nghttp2-0:1.7.1-7.el6.1.x86_64", "relates_to_product_reference": "6Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-debuginfo-0:1.7.1-7.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el6.1.x86_64" }, "product_reference": "httpd24-nghttp2-debuginfo-0:1.7.1-7.el6.1.x86_64", "relates_to_product_reference": "6Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.34-8.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.aarch64" }, "product_reference": "httpd24-httpd-0:2.4.34-8.el7.1.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.34-8.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.ppc64le" }, "product_reference": "httpd24-httpd-0:2.4.34-8.el7.1.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.34-8.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.s390x" }, "product_reference": "httpd24-httpd-0:2.4.34-8.el7.1.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.34-8.el7.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.src" }, "product_reference": "httpd24-httpd-0:2.4.34-8.el7.1.src", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.34-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.x86_64" }, "product_reference": "httpd24-httpd-0:2.4.34-8.el7.1.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.aarch64" }, "product_reference": "httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.ppc64le" }, "product_reference": "httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.s390x" }, "product_reference": "httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.x86_64" }, "product_reference": "httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-devel-0:2.4.34-8.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.aarch64" }, "product_reference": "httpd24-httpd-devel-0:2.4.34-8.el7.1.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-devel-0:2.4.34-8.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.ppc64le" }, "product_reference": "httpd24-httpd-devel-0:2.4.34-8.el7.1.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-devel-0:2.4.34-8.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.s390x" }, "product_reference": "httpd24-httpd-devel-0:2.4.34-8.el7.1.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-devel-0:2.4.34-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.x86_64" }, "product_reference": "httpd24-httpd-devel-0:2.4.34-8.el7.1.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-manual-0:2.4.34-8.el7.1.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:httpd24-httpd-manual-0:2.4.34-8.el7.1.noarch" }, "product_reference": "httpd24-httpd-manual-0:2.4.34-8.el7.1.noarch", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-tools-0:2.4.34-8.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.aarch64" }, "product_reference": "httpd24-httpd-tools-0:2.4.34-8.el7.1.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-tools-0:2.4.34-8.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.ppc64le" }, "product_reference": "httpd24-httpd-tools-0:2.4.34-8.el7.1.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-tools-0:2.4.34-8.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.s390x" }, "product_reference": "httpd24-httpd-tools-0:2.4.34-8.el7.1.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-tools-0:2.4.34-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.x86_64" }, "product_reference": "httpd24-httpd-tools-0:2.4.34-8.el7.1.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-libnghttp2-0:1.7.1-7.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.aarch64" }, "product_reference": "httpd24-libnghttp2-0:1.7.1-7.el7.1.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-libnghttp2-0:1.7.1-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.ppc64le" }, "product_reference": "httpd24-libnghttp2-0:1.7.1-7.el7.1.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-libnghttp2-0:1.7.1-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.s390x" }, "product_reference": "httpd24-libnghttp2-0:1.7.1-7.el7.1.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-libnghttp2-0:1.7.1-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.x86_64" }, "product_reference": "httpd24-libnghttp2-0:1.7.1-7.el7.1.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.aarch64" }, "product_reference": "httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.ppc64le" }, "product_reference": "httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.s390x" }, "product_reference": "httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.x86_64" }, "product_reference": "httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ldap-0:2.4.34-8.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.aarch64" }, "product_reference": "httpd24-mod_ldap-0:2.4.34-8.el7.1.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ldap-0:2.4.34-8.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.ppc64le" }, "product_reference": "httpd24-mod_ldap-0:2.4.34-8.el7.1.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ldap-0:2.4.34-8.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.s390x" }, "product_reference": "httpd24-mod_ldap-0:2.4.34-8.el7.1.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ldap-0:2.4.34-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.x86_64" }, "product_reference": "httpd24-mod_ldap-0:2.4.34-8.el7.1.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_md-0:2.4.34-8.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.aarch64" }, "product_reference": "httpd24-mod_md-0:2.4.34-8.el7.1.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_md-0:2.4.34-8.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.ppc64le" }, "product_reference": "httpd24-mod_md-0:2.4.34-8.el7.1.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_md-0:2.4.34-8.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.s390x" }, "product_reference": "httpd24-mod_md-0:2.4.34-8.el7.1.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_md-0:2.4.34-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.x86_64" }, "product_reference": "httpd24-mod_md-0:2.4.34-8.el7.1.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_proxy_html-1:2.4.34-8.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.aarch64" }, "product_reference": "httpd24-mod_proxy_html-1:2.4.34-8.el7.1.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_proxy_html-1:2.4.34-8.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.ppc64le" }, "product_reference": "httpd24-mod_proxy_html-1:2.4.34-8.el7.1.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_proxy_html-1:2.4.34-8.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.s390x" }, "product_reference": "httpd24-mod_proxy_html-1:2.4.34-8.el7.1.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_proxy_html-1:2.4.34-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.x86_64" }, "product_reference": "httpd24-mod_proxy_html-1:2.4.34-8.el7.1.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_session-0:2.4.34-8.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.aarch64" }, "product_reference": "httpd24-mod_session-0:2.4.34-8.el7.1.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_session-0:2.4.34-8.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.ppc64le" }, "product_reference": "httpd24-mod_session-0:2.4.34-8.el7.1.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_session-0:2.4.34-8.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.s390x" }, "product_reference": "httpd24-mod_session-0:2.4.34-8.el7.1.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_session-0:2.4.34-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.x86_64" }, "product_reference": "httpd24-mod_session-0:2.4.34-8.el7.1.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ssl-1:2.4.34-8.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.aarch64" }, "product_reference": "httpd24-mod_ssl-1:2.4.34-8.el7.1.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ssl-1:2.4.34-8.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.ppc64le" }, "product_reference": "httpd24-mod_ssl-1:2.4.34-8.el7.1.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ssl-1:2.4.34-8.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.s390x" }, "product_reference": "httpd24-mod_ssl-1:2.4.34-8.el7.1.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ssl-1:2.4.34-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.x86_64" }, "product_reference": "httpd24-mod_ssl-1:2.4.34-8.el7.1.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-0:1.7.1-7.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.aarch64" }, "product_reference": "httpd24-nghttp2-0:1.7.1-7.el7.1.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-0:1.7.1-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.ppc64le" }, "product_reference": "httpd24-nghttp2-0:1.7.1-7.el7.1.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-0:1.7.1-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.s390x" }, "product_reference": "httpd24-nghttp2-0:1.7.1-7.el7.1.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-0:1.7.1-7.el7.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.src" }, "product_reference": "httpd24-nghttp2-0:1.7.1-7.el7.1.src", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-0:1.7.1-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.x86_64" }, "product_reference": "httpd24-nghttp2-0:1.7.1-7.el7.1.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.aarch64" }, "product_reference": "httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.ppc64le" }, "product_reference": "httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.s390x" }, "product_reference": "httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.x86_64" }, "product_reference": "httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.34-8.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-0:2.4.34-8.el7.1.ppc64le" }, "product_reference": "httpd24-httpd-0:2.4.34-8.el7.1.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.34-8.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-0:2.4.34-8.el7.1.s390x" }, "product_reference": "httpd24-httpd-0:2.4.34-8.el7.1.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.34-8.el7.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-0:2.4.34-8.el7.1.src" }, "product_reference": "httpd24-httpd-0:2.4.34-8.el7.1.src", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.34-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-0:2.4.34-8.el7.1.x86_64" }, "product_reference": "httpd24-httpd-0:2.4.34-8.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.ppc64le" }, "product_reference": "httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.s390x" }, "product_reference": "httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.x86_64" }, "product_reference": "httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-devel-0:2.4.34-8.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.ppc64le" }, "product_reference": "httpd24-httpd-devel-0:2.4.34-8.el7.1.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-devel-0:2.4.34-8.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.s390x" }, "product_reference": "httpd24-httpd-devel-0:2.4.34-8.el7.1.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-devel-0:2.4.34-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.x86_64" }, "product_reference": "httpd24-httpd-devel-0:2.4.34-8.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-manual-0:2.4.34-8.el7.1.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-manual-0:2.4.34-8.el7.1.noarch" }, "product_reference": "httpd24-httpd-manual-0:2.4.34-8.el7.1.noarch", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-tools-0:2.4.34-8.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.ppc64le" }, "product_reference": "httpd24-httpd-tools-0:2.4.34-8.el7.1.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-tools-0:2.4.34-8.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.s390x" }, "product_reference": "httpd24-httpd-tools-0:2.4.34-8.el7.1.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-tools-0:2.4.34-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.x86_64" }, "product_reference": "httpd24-httpd-tools-0:2.4.34-8.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-libnghttp2-0:1.7.1-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.ppc64le" }, "product_reference": "httpd24-libnghttp2-0:1.7.1-7.el7.1.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-libnghttp2-0:1.7.1-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.s390x" }, "product_reference": "httpd24-libnghttp2-0:1.7.1-7.el7.1.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-libnghttp2-0:1.7.1-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.x86_64" }, "product_reference": "httpd24-libnghttp2-0:1.7.1-7.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.ppc64le" }, "product_reference": "httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.s390x" }, "product_reference": "httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.x86_64" }, "product_reference": "httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ldap-0:2.4.34-8.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.ppc64le" }, "product_reference": "httpd24-mod_ldap-0:2.4.34-8.el7.1.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ldap-0:2.4.34-8.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.s390x" }, "product_reference": "httpd24-mod_ldap-0:2.4.34-8.el7.1.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ldap-0:2.4.34-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.x86_64" }, "product_reference": "httpd24-mod_ldap-0:2.4.34-8.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_md-0:2.4.34-8.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_md-0:2.4.34-8.el7.1.ppc64le" }, "product_reference": "httpd24-mod_md-0:2.4.34-8.el7.1.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_md-0:2.4.34-8.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_md-0:2.4.34-8.el7.1.s390x" }, "product_reference": "httpd24-mod_md-0:2.4.34-8.el7.1.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_md-0:2.4.34-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_md-0:2.4.34-8.el7.1.x86_64" }, "product_reference": "httpd24-mod_md-0:2.4.34-8.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_proxy_html-1:2.4.34-8.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.ppc64le" }, "product_reference": "httpd24-mod_proxy_html-1:2.4.34-8.el7.1.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_proxy_html-1:2.4.34-8.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.s390x" }, "product_reference": "httpd24-mod_proxy_html-1:2.4.34-8.el7.1.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_proxy_html-1:2.4.34-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.x86_64" }, "product_reference": "httpd24-mod_proxy_html-1:2.4.34-8.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_session-0:2.4.34-8.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_session-0:2.4.34-8.el7.1.ppc64le" }, "product_reference": "httpd24-mod_session-0:2.4.34-8.el7.1.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_session-0:2.4.34-8.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_session-0:2.4.34-8.el7.1.s390x" }, "product_reference": "httpd24-mod_session-0:2.4.34-8.el7.1.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_session-0:2.4.34-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_session-0:2.4.34-8.el7.1.x86_64" }, "product_reference": "httpd24-mod_session-0:2.4.34-8.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ssl-1:2.4.34-8.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.ppc64le" }, "product_reference": "httpd24-mod_ssl-1:2.4.34-8.el7.1.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ssl-1:2.4.34-8.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.s390x" }, "product_reference": "httpd24-mod_ssl-1:2.4.34-8.el7.1.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ssl-1:2.4.34-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.x86_64" }, "product_reference": "httpd24-mod_ssl-1:2.4.34-8.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-0:1.7.1-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.ppc64le" }, "product_reference": "httpd24-nghttp2-0:1.7.1-7.el7.1.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-0:1.7.1-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.s390x" }, "product_reference": "httpd24-nghttp2-0:1.7.1-7.el7.1.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-0:1.7.1-7.el7.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.src" }, "product_reference": "httpd24-nghttp2-0:1.7.1-7.el7.1.src", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-0:1.7.1-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.x86_64" }, "product_reference": "httpd24-nghttp2-0:1.7.1-7.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.ppc64le" }, "product_reference": "httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.s390x" }, "product_reference": "httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.x86_64" }, "product_reference": "httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.34-8.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-0:2.4.34-8.el7.1.ppc64le" }, "product_reference": "httpd24-httpd-0:2.4.34-8.el7.1.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.34-8.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-0:2.4.34-8.el7.1.s390x" }, "product_reference": "httpd24-httpd-0:2.4.34-8.el7.1.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.34-8.el7.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-0:2.4.34-8.el7.1.src" }, "product_reference": "httpd24-httpd-0:2.4.34-8.el7.1.src", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.34-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-0:2.4.34-8.el7.1.x86_64" }, "product_reference": "httpd24-httpd-0:2.4.34-8.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.ppc64le" }, "product_reference": "httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.s390x" }, "product_reference": "httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.x86_64" }, "product_reference": "httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-devel-0:2.4.34-8.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.ppc64le" }, "product_reference": "httpd24-httpd-devel-0:2.4.34-8.el7.1.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-devel-0:2.4.34-8.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.s390x" }, "product_reference": "httpd24-httpd-devel-0:2.4.34-8.el7.1.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-devel-0:2.4.34-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.x86_64" }, "product_reference": "httpd24-httpd-devel-0:2.4.34-8.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-manual-0:2.4.34-8.el7.1.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-manual-0:2.4.34-8.el7.1.noarch" }, "product_reference": "httpd24-httpd-manual-0:2.4.34-8.el7.1.noarch", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-tools-0:2.4.34-8.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.ppc64le" }, "product_reference": "httpd24-httpd-tools-0:2.4.34-8.el7.1.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-tools-0:2.4.34-8.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.s390x" }, "product_reference": "httpd24-httpd-tools-0:2.4.34-8.el7.1.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-tools-0:2.4.34-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.x86_64" }, "product_reference": "httpd24-httpd-tools-0:2.4.34-8.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-libnghttp2-0:1.7.1-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.ppc64le" }, "product_reference": "httpd24-libnghttp2-0:1.7.1-7.el7.1.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-libnghttp2-0:1.7.1-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.s390x" }, "product_reference": "httpd24-libnghttp2-0:1.7.1-7.el7.1.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-libnghttp2-0:1.7.1-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.x86_64" }, "product_reference": "httpd24-libnghttp2-0:1.7.1-7.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.ppc64le" }, "product_reference": "httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.s390x" }, "product_reference": "httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.x86_64" }, "product_reference": "httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ldap-0:2.4.34-8.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.ppc64le" }, "product_reference": "httpd24-mod_ldap-0:2.4.34-8.el7.1.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ldap-0:2.4.34-8.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.s390x" }, "product_reference": "httpd24-mod_ldap-0:2.4.34-8.el7.1.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ldap-0:2.4.34-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.x86_64" }, "product_reference": "httpd24-mod_ldap-0:2.4.34-8.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_md-0:2.4.34-8.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_md-0:2.4.34-8.el7.1.ppc64le" }, "product_reference": "httpd24-mod_md-0:2.4.34-8.el7.1.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_md-0:2.4.34-8.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_md-0:2.4.34-8.el7.1.s390x" }, "product_reference": "httpd24-mod_md-0:2.4.34-8.el7.1.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_md-0:2.4.34-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_md-0:2.4.34-8.el7.1.x86_64" }, "product_reference": "httpd24-mod_md-0:2.4.34-8.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_proxy_html-1:2.4.34-8.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.ppc64le" }, "product_reference": "httpd24-mod_proxy_html-1:2.4.34-8.el7.1.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_proxy_html-1:2.4.34-8.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.s390x" }, "product_reference": "httpd24-mod_proxy_html-1:2.4.34-8.el7.1.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_proxy_html-1:2.4.34-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.x86_64" }, "product_reference": "httpd24-mod_proxy_html-1:2.4.34-8.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_session-0:2.4.34-8.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_session-0:2.4.34-8.el7.1.ppc64le" }, "product_reference": "httpd24-mod_session-0:2.4.34-8.el7.1.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_session-0:2.4.34-8.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_session-0:2.4.34-8.el7.1.s390x" }, "product_reference": "httpd24-mod_session-0:2.4.34-8.el7.1.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_session-0:2.4.34-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_session-0:2.4.34-8.el7.1.x86_64" }, "product_reference": "httpd24-mod_session-0:2.4.34-8.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ssl-1:2.4.34-8.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.ppc64le" }, "product_reference": "httpd24-mod_ssl-1:2.4.34-8.el7.1.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ssl-1:2.4.34-8.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.s390x" }, "product_reference": "httpd24-mod_ssl-1:2.4.34-8.el7.1.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ssl-1:2.4.34-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.x86_64" }, "product_reference": "httpd24-mod_ssl-1:2.4.34-8.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-0:1.7.1-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.ppc64le" }, "product_reference": "httpd24-nghttp2-0:1.7.1-7.el7.1.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-0:1.7.1-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.s390x" }, "product_reference": "httpd24-nghttp2-0:1.7.1-7.el7.1.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-0:1.7.1-7.el7.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.src" }, "product_reference": "httpd24-nghttp2-0:1.7.1-7.el7.1.src", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-0:1.7.1-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.x86_64" }, "product_reference": "httpd24-nghttp2-0:1.7.1-7.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.ppc64le" }, "product_reference": "httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.s390x" }, "product_reference": "httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.x86_64" }, "product_reference": "httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.34-8.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-0:2.4.34-8.el7.1.ppc64le" }, "product_reference": "httpd24-httpd-0:2.4.34-8.el7.1.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.34-8.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-0:2.4.34-8.el7.1.s390x" }, "product_reference": "httpd24-httpd-0:2.4.34-8.el7.1.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.34-8.el7.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-0:2.4.34-8.el7.1.src" }, "product_reference": "httpd24-httpd-0:2.4.34-8.el7.1.src", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.34-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-0:2.4.34-8.el7.1.x86_64" }, "product_reference": "httpd24-httpd-0:2.4.34-8.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.ppc64le" }, "product_reference": "httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.s390x" }, "product_reference": "httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.x86_64" }, "product_reference": "httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-devel-0:2.4.34-8.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.ppc64le" }, "product_reference": "httpd24-httpd-devel-0:2.4.34-8.el7.1.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-devel-0:2.4.34-8.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.s390x" }, "product_reference": "httpd24-httpd-devel-0:2.4.34-8.el7.1.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-devel-0:2.4.34-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.x86_64" }, "product_reference": "httpd24-httpd-devel-0:2.4.34-8.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-manual-0:2.4.34-8.el7.1.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-manual-0:2.4.34-8.el7.1.noarch" }, "product_reference": "httpd24-httpd-manual-0:2.4.34-8.el7.1.noarch", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-tools-0:2.4.34-8.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.ppc64le" }, "product_reference": "httpd24-httpd-tools-0:2.4.34-8.el7.1.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-tools-0:2.4.34-8.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.s390x" }, "product_reference": "httpd24-httpd-tools-0:2.4.34-8.el7.1.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-tools-0:2.4.34-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.x86_64" }, "product_reference": "httpd24-httpd-tools-0:2.4.34-8.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-libnghttp2-0:1.7.1-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.ppc64le" }, "product_reference": "httpd24-libnghttp2-0:1.7.1-7.el7.1.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-libnghttp2-0:1.7.1-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.s390x" }, "product_reference": "httpd24-libnghttp2-0:1.7.1-7.el7.1.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-libnghttp2-0:1.7.1-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.x86_64" }, "product_reference": "httpd24-libnghttp2-0:1.7.1-7.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.ppc64le" }, "product_reference": "httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.s390x" }, "product_reference": "httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.x86_64" }, "product_reference": "httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ldap-0:2.4.34-8.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.ppc64le" }, "product_reference": "httpd24-mod_ldap-0:2.4.34-8.el7.1.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ldap-0:2.4.34-8.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.s390x" }, "product_reference": "httpd24-mod_ldap-0:2.4.34-8.el7.1.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ldap-0:2.4.34-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.x86_64" }, "product_reference": "httpd24-mod_ldap-0:2.4.34-8.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_md-0:2.4.34-8.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_md-0:2.4.34-8.el7.1.ppc64le" }, "product_reference": "httpd24-mod_md-0:2.4.34-8.el7.1.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_md-0:2.4.34-8.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_md-0:2.4.34-8.el7.1.s390x" }, "product_reference": "httpd24-mod_md-0:2.4.34-8.el7.1.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_md-0:2.4.34-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_md-0:2.4.34-8.el7.1.x86_64" }, "product_reference": "httpd24-mod_md-0:2.4.34-8.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_proxy_html-1:2.4.34-8.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.ppc64le" }, "product_reference": "httpd24-mod_proxy_html-1:2.4.34-8.el7.1.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_proxy_html-1:2.4.34-8.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.s390x" }, "product_reference": "httpd24-mod_proxy_html-1:2.4.34-8.el7.1.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_proxy_html-1:2.4.34-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.x86_64" }, "product_reference": "httpd24-mod_proxy_html-1:2.4.34-8.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_session-0:2.4.34-8.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_session-0:2.4.34-8.el7.1.ppc64le" }, "product_reference": "httpd24-mod_session-0:2.4.34-8.el7.1.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_session-0:2.4.34-8.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_session-0:2.4.34-8.el7.1.s390x" }, "product_reference": "httpd24-mod_session-0:2.4.34-8.el7.1.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_session-0:2.4.34-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_session-0:2.4.34-8.el7.1.x86_64" }, "product_reference": "httpd24-mod_session-0:2.4.34-8.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ssl-1:2.4.34-8.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.ppc64le" }, "product_reference": "httpd24-mod_ssl-1:2.4.34-8.el7.1.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ssl-1:2.4.34-8.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.s390x" }, "product_reference": "httpd24-mod_ssl-1:2.4.34-8.el7.1.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ssl-1:2.4.34-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.x86_64" }, "product_reference": "httpd24-mod_ssl-1:2.4.34-8.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-0:1.7.1-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.ppc64le" }, "product_reference": "httpd24-nghttp2-0:1.7.1-7.el7.1.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-0:1.7.1-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.s390x" }, "product_reference": "httpd24-nghttp2-0:1.7.1-7.el7.1.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-0:1.7.1-7.el7.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.src" }, "product_reference": "httpd24-nghttp2-0:1.7.1-7.el7.1.src", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-0:1.7.1-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.x86_64" }, "product_reference": "httpd24-nghttp2-0:1.7.1-7.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.ppc64le" }, "product_reference": "httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.s390x" }, "product_reference": "httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.x86_64" }, "product_reference": "httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.34-8.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.aarch64" }, "product_reference": "httpd24-httpd-0:2.4.34-8.el7.1.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.34-8.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.ppc64le" }, "product_reference": "httpd24-httpd-0:2.4.34-8.el7.1.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.34-8.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.s390x" }, "product_reference": "httpd24-httpd-0:2.4.34-8.el7.1.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.34-8.el7.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.src" }, "product_reference": "httpd24-httpd-0:2.4.34-8.el7.1.src", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.34-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.x86_64" }, "product_reference": "httpd24-httpd-0:2.4.34-8.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.aarch64" }, "product_reference": "httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.ppc64le" }, "product_reference": "httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.s390x" }, "product_reference": "httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.x86_64" }, "product_reference": "httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-devel-0:2.4.34-8.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.aarch64" }, "product_reference": "httpd24-httpd-devel-0:2.4.34-8.el7.1.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-devel-0:2.4.34-8.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.ppc64le" }, "product_reference": "httpd24-httpd-devel-0:2.4.34-8.el7.1.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-devel-0:2.4.34-8.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.s390x" }, "product_reference": "httpd24-httpd-devel-0:2.4.34-8.el7.1.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-devel-0:2.4.34-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.x86_64" }, "product_reference": "httpd24-httpd-devel-0:2.4.34-8.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-manual-0:2.4.34-8.el7.1.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:httpd24-httpd-manual-0:2.4.34-8.el7.1.noarch" }, "product_reference": "httpd24-httpd-manual-0:2.4.34-8.el7.1.noarch", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-tools-0:2.4.34-8.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.aarch64" }, "product_reference": "httpd24-httpd-tools-0:2.4.34-8.el7.1.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-tools-0:2.4.34-8.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.ppc64le" }, "product_reference": "httpd24-httpd-tools-0:2.4.34-8.el7.1.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-tools-0:2.4.34-8.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.s390x" }, "product_reference": "httpd24-httpd-tools-0:2.4.34-8.el7.1.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-tools-0:2.4.34-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.x86_64" }, "product_reference": "httpd24-httpd-tools-0:2.4.34-8.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-libnghttp2-0:1.7.1-7.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.aarch64" }, "product_reference": "httpd24-libnghttp2-0:1.7.1-7.el7.1.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-libnghttp2-0:1.7.1-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.ppc64le" }, "product_reference": "httpd24-libnghttp2-0:1.7.1-7.el7.1.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-libnghttp2-0:1.7.1-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.s390x" }, "product_reference": "httpd24-libnghttp2-0:1.7.1-7.el7.1.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-libnghttp2-0:1.7.1-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.x86_64" }, "product_reference": "httpd24-libnghttp2-0:1.7.1-7.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.aarch64" }, "product_reference": "httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.ppc64le" }, "product_reference": "httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.s390x" }, "product_reference": "httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.x86_64" }, "product_reference": "httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ldap-0:2.4.34-8.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.aarch64" }, "product_reference": "httpd24-mod_ldap-0:2.4.34-8.el7.1.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ldap-0:2.4.34-8.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.ppc64le" }, "product_reference": "httpd24-mod_ldap-0:2.4.34-8.el7.1.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ldap-0:2.4.34-8.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.s390x" }, "product_reference": "httpd24-mod_ldap-0:2.4.34-8.el7.1.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ldap-0:2.4.34-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.x86_64" }, "product_reference": "httpd24-mod_ldap-0:2.4.34-8.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_md-0:2.4.34-8.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.aarch64" }, "product_reference": "httpd24-mod_md-0:2.4.34-8.el7.1.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_md-0:2.4.34-8.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.ppc64le" }, "product_reference": "httpd24-mod_md-0:2.4.34-8.el7.1.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_md-0:2.4.34-8.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.s390x" }, "product_reference": "httpd24-mod_md-0:2.4.34-8.el7.1.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_md-0:2.4.34-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.x86_64" }, "product_reference": "httpd24-mod_md-0:2.4.34-8.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_proxy_html-1:2.4.34-8.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.aarch64" }, "product_reference": "httpd24-mod_proxy_html-1:2.4.34-8.el7.1.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_proxy_html-1:2.4.34-8.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.ppc64le" }, "product_reference": "httpd24-mod_proxy_html-1:2.4.34-8.el7.1.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_proxy_html-1:2.4.34-8.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.s390x" }, "product_reference": "httpd24-mod_proxy_html-1:2.4.34-8.el7.1.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_proxy_html-1:2.4.34-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.x86_64" }, "product_reference": "httpd24-mod_proxy_html-1:2.4.34-8.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_session-0:2.4.34-8.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.aarch64" }, "product_reference": "httpd24-mod_session-0:2.4.34-8.el7.1.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_session-0:2.4.34-8.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.ppc64le" }, "product_reference": "httpd24-mod_session-0:2.4.34-8.el7.1.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_session-0:2.4.34-8.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.s390x" }, "product_reference": "httpd24-mod_session-0:2.4.34-8.el7.1.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_session-0:2.4.34-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.x86_64" }, "product_reference": "httpd24-mod_session-0:2.4.34-8.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ssl-1:2.4.34-8.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.aarch64" }, "product_reference": "httpd24-mod_ssl-1:2.4.34-8.el7.1.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ssl-1:2.4.34-8.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.ppc64le" }, "product_reference": "httpd24-mod_ssl-1:2.4.34-8.el7.1.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ssl-1:2.4.34-8.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.s390x" }, "product_reference": "httpd24-mod_ssl-1:2.4.34-8.el7.1.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ssl-1:2.4.34-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.x86_64" }, "product_reference": "httpd24-mod_ssl-1:2.4.34-8.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-0:1.7.1-7.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.aarch64" }, "product_reference": "httpd24-nghttp2-0:1.7.1-7.el7.1.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-0:1.7.1-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.ppc64le" }, "product_reference": "httpd24-nghttp2-0:1.7.1-7.el7.1.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-0:1.7.1-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.s390x" }, "product_reference": "httpd24-nghttp2-0:1.7.1-7.el7.1.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-0:1.7.1-7.el7.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.src" }, "product_reference": "httpd24-nghttp2-0:1.7.1-7.el7.1.src", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-0:1.7.1-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.x86_64" }, "product_reference": "httpd24-nghttp2-0:1.7.1-7.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.aarch64" }, "product_reference": "httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.ppc64le" }, "product_reference": "httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.s390x" }, "product_reference": "httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.x86_64" }, "product_reference": "httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.34-8.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.aarch64" }, "product_reference": "httpd24-httpd-0:2.4.34-8.el7.1.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.34-8.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.ppc64le" }, "product_reference": "httpd24-httpd-0:2.4.34-8.el7.1.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.34-8.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.s390x" }, "product_reference": "httpd24-httpd-0:2.4.34-8.el7.1.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.34-8.el7.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.src" }, "product_reference": "httpd24-httpd-0:2.4.34-8.el7.1.src", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.34-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.x86_64" }, "product_reference": "httpd24-httpd-0:2.4.34-8.el7.1.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.aarch64" }, "product_reference": "httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.ppc64le" }, "product_reference": "httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.s390x" }, "product_reference": "httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.x86_64" }, "product_reference": "httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-devel-0:2.4.34-8.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.aarch64" }, "product_reference": "httpd24-httpd-devel-0:2.4.34-8.el7.1.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-devel-0:2.4.34-8.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.ppc64le" }, "product_reference": "httpd24-httpd-devel-0:2.4.34-8.el7.1.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-devel-0:2.4.34-8.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.s390x" }, "product_reference": "httpd24-httpd-devel-0:2.4.34-8.el7.1.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-devel-0:2.4.34-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.x86_64" }, "product_reference": "httpd24-httpd-devel-0:2.4.34-8.el7.1.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-manual-0:2.4.34-8.el7.1.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:httpd24-httpd-manual-0:2.4.34-8.el7.1.noarch" }, "product_reference": "httpd24-httpd-manual-0:2.4.34-8.el7.1.noarch", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-tools-0:2.4.34-8.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.aarch64" }, "product_reference": "httpd24-httpd-tools-0:2.4.34-8.el7.1.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-tools-0:2.4.34-8.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.ppc64le" }, "product_reference": "httpd24-httpd-tools-0:2.4.34-8.el7.1.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-tools-0:2.4.34-8.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.s390x" }, "product_reference": "httpd24-httpd-tools-0:2.4.34-8.el7.1.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-tools-0:2.4.34-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.x86_64" }, "product_reference": "httpd24-httpd-tools-0:2.4.34-8.el7.1.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-libnghttp2-0:1.7.1-7.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.aarch64" }, "product_reference": "httpd24-libnghttp2-0:1.7.1-7.el7.1.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-libnghttp2-0:1.7.1-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.ppc64le" }, "product_reference": "httpd24-libnghttp2-0:1.7.1-7.el7.1.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-libnghttp2-0:1.7.1-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.s390x" }, "product_reference": "httpd24-libnghttp2-0:1.7.1-7.el7.1.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-libnghttp2-0:1.7.1-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.x86_64" }, "product_reference": "httpd24-libnghttp2-0:1.7.1-7.el7.1.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.aarch64" }, "product_reference": "httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.ppc64le" }, "product_reference": "httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.s390x" }, "product_reference": "httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.x86_64" }, "product_reference": "httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ldap-0:2.4.34-8.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.aarch64" }, "product_reference": "httpd24-mod_ldap-0:2.4.34-8.el7.1.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ldap-0:2.4.34-8.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.ppc64le" }, "product_reference": "httpd24-mod_ldap-0:2.4.34-8.el7.1.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ldap-0:2.4.34-8.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.s390x" }, "product_reference": "httpd24-mod_ldap-0:2.4.34-8.el7.1.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ldap-0:2.4.34-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.x86_64" }, "product_reference": "httpd24-mod_ldap-0:2.4.34-8.el7.1.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_md-0:2.4.34-8.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.aarch64" }, "product_reference": "httpd24-mod_md-0:2.4.34-8.el7.1.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_md-0:2.4.34-8.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.ppc64le" }, "product_reference": "httpd24-mod_md-0:2.4.34-8.el7.1.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_md-0:2.4.34-8.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.s390x" }, "product_reference": "httpd24-mod_md-0:2.4.34-8.el7.1.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_md-0:2.4.34-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.x86_64" }, "product_reference": "httpd24-mod_md-0:2.4.34-8.el7.1.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_proxy_html-1:2.4.34-8.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.aarch64" }, "product_reference": "httpd24-mod_proxy_html-1:2.4.34-8.el7.1.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_proxy_html-1:2.4.34-8.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.ppc64le" }, "product_reference": "httpd24-mod_proxy_html-1:2.4.34-8.el7.1.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_proxy_html-1:2.4.34-8.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.s390x" }, "product_reference": "httpd24-mod_proxy_html-1:2.4.34-8.el7.1.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_proxy_html-1:2.4.34-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.x86_64" }, "product_reference": "httpd24-mod_proxy_html-1:2.4.34-8.el7.1.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_session-0:2.4.34-8.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.aarch64" }, "product_reference": "httpd24-mod_session-0:2.4.34-8.el7.1.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_session-0:2.4.34-8.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.ppc64le" }, "product_reference": "httpd24-mod_session-0:2.4.34-8.el7.1.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_session-0:2.4.34-8.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.s390x" }, "product_reference": "httpd24-mod_session-0:2.4.34-8.el7.1.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_session-0:2.4.34-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.x86_64" }, "product_reference": "httpd24-mod_session-0:2.4.34-8.el7.1.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ssl-1:2.4.34-8.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.aarch64" }, "product_reference": "httpd24-mod_ssl-1:2.4.34-8.el7.1.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ssl-1:2.4.34-8.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.ppc64le" }, "product_reference": "httpd24-mod_ssl-1:2.4.34-8.el7.1.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ssl-1:2.4.34-8.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.s390x" }, "product_reference": "httpd24-mod_ssl-1:2.4.34-8.el7.1.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ssl-1:2.4.34-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.x86_64" }, "product_reference": "httpd24-mod_ssl-1:2.4.34-8.el7.1.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-0:1.7.1-7.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.aarch64" }, "product_reference": "httpd24-nghttp2-0:1.7.1-7.el7.1.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-0:1.7.1-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.ppc64le" }, "product_reference": "httpd24-nghttp2-0:1.7.1-7.el7.1.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-0:1.7.1-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.s390x" }, "product_reference": "httpd24-nghttp2-0:1.7.1-7.el7.1.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-0:1.7.1-7.el7.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.src" }, "product_reference": "httpd24-nghttp2-0:1.7.1-7.el7.1.src", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-0:1.7.1-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.x86_64" }, "product_reference": "httpd24-nghttp2-0:1.7.1-7.el7.1.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.aarch64" }, "product_reference": "httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.ppc64le" }, "product_reference": "httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.s390x" }, "product_reference": "httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.x86_64" }, "product_reference": "httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-9511", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741860" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker can request a large amount of data by manipulating window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this queue can consume excess CPU, memory, or both, leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: large amount of data requests leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "There are no mitigations available for nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el6.1.src", "6Server-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-httpd-manual-0:2.4.34-8.el6.1.noarch", "6Server-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el6.1.src", "6Server-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el6.1.src", "6Workstation-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-httpd-manual-0:2.4.34-8.el6.1.noarch", "6Workstation-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el6.1.src", "6Workstation-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el6.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.src", "7Server-Alt-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-manual-0:2.4.34-8.el7.1.noarch", "7Server-Alt-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.src", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-0:2.4.34-8.el7.1.src", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-manual-0:2.4.34-8.el7.1.noarch", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_md-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_md-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_md-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_session-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_session-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_session-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.src", "7Server-RHSCL-3.3-7.5.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-0:2.4.34-8.el7.1.src", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-manual-0:2.4.34-8.el7.1.noarch", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_md-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_md-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_md-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_session-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_session-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_session-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.src", "7Server-RHSCL-3.3-7.6.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-0:2.4.34-8.el7.1.src", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-manual-0:2.4.34-8.el7.1.noarch", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_md-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_md-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_md-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_session-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_session-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_session-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.src", "7Server-RHSCL-3.3-7.7.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.src", "7Server-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-httpd-manual-0:2.4.34-8.el7.1.noarch", "7Server-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.src", "7Server-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.src", "7Workstation-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-httpd-manual-0:2.4.34-8.el7.1.noarch", "7Workstation-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.src", "7Workstation-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9511" }, { "category": "external", "summary": "RHBZ#1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9511", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9511" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-01T16:14:19+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "6Server-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el6.1.src", "6Server-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-httpd-manual-0:2.4.34-8.el6.1.noarch", "6Server-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el6.1.src", "6Server-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el6.1.src", "6Workstation-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-httpd-manual-0:2.4.34-8.el6.1.noarch", "6Workstation-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el6.1.src", "6Workstation-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el6.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.src", "7Server-Alt-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-manual-0:2.4.34-8.el7.1.noarch", "7Server-Alt-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.src", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-0:2.4.34-8.el7.1.src", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-manual-0:2.4.34-8.el7.1.noarch", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_md-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_md-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_md-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_session-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_session-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_session-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.src", "7Server-RHSCL-3.3-7.5.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-0:2.4.34-8.el7.1.src", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-manual-0:2.4.34-8.el7.1.noarch", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_md-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_md-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_md-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_session-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_session-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_session-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.src", "7Server-RHSCL-3.3-7.6.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-0:2.4.34-8.el7.1.src", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-manual-0:2.4.34-8.el7.1.noarch", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_md-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_md-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_md-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_session-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_session-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_session-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.src", "7Server-RHSCL-3.3-7.7.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.src", "7Server-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-httpd-manual-0:2.4.34-8.el7.1.noarch", "7Server-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.src", "7Server-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.src", "7Workstation-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-httpd-manual-0:2.4.34-8.el7.1.noarch", "7Workstation-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.src", "7Workstation-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2949" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "6Server-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el6.1.src", "6Server-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-httpd-manual-0:2.4.34-8.el6.1.noarch", "6Server-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el6.1.src", "6Server-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el6.1.src", "6Workstation-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-httpd-manual-0:2.4.34-8.el6.1.noarch", "6Workstation-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el6.1.src", "6Workstation-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el6.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.src", "7Server-Alt-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-manual-0:2.4.34-8.el7.1.noarch", "7Server-Alt-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.src", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-0:2.4.34-8.el7.1.src", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-manual-0:2.4.34-8.el7.1.noarch", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_md-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_md-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_md-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_session-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_session-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_session-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.src", "7Server-RHSCL-3.3-7.5.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-0:2.4.34-8.el7.1.src", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-manual-0:2.4.34-8.el7.1.noarch", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_md-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_md-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_md-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_session-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_session-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_session-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.src", "7Server-RHSCL-3.3-7.6.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-0:2.4.34-8.el7.1.src", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-manual-0:2.4.34-8.el7.1.noarch", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_md-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_md-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_md-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_session-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_session-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_session-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.src", "7Server-RHSCL-3.3-7.7.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.src", "7Server-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-httpd-manual-0:2.4.34-8.el7.1.noarch", "7Server-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.src", "7Server-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.src", "7Workstation-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-httpd-manual-0:2.4.34-8.el7.1.noarch", "7Workstation-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.src", "7Workstation-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el6.1.src", "6Server-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-httpd-manual-0:2.4.34-8.el6.1.noarch", "6Server-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el6.1.src", "6Server-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el6.1.src", "6Workstation-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-httpd-manual-0:2.4.34-8.el6.1.noarch", "6Workstation-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el6.1.src", "6Workstation-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el6.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.src", "7Server-Alt-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-manual-0:2.4.34-8.el7.1.noarch", "7Server-Alt-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.src", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-0:2.4.34-8.el7.1.src", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-manual-0:2.4.34-8.el7.1.noarch", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_md-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_md-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_md-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_session-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_session-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_session-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.src", "7Server-RHSCL-3.3-7.5.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-0:2.4.34-8.el7.1.src", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-manual-0:2.4.34-8.el7.1.noarch", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_md-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_md-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_md-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_session-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_session-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_session-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.src", "7Server-RHSCL-3.3-7.6.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-0:2.4.34-8.el7.1.src", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-manual-0:2.4.34-8.el7.1.noarch", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_md-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_md-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_md-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_session-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_session-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_session-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.src", "7Server-RHSCL-3.3-7.7.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.src", "7Server-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-httpd-manual-0:2.4.34-8.el7.1.noarch", "7Server-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.src", "7Server-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.src", "7Workstation-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-httpd-manual-0:2.4.34-8.el7.1.noarch", "7Workstation-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.src", "7Workstation-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: large amount of data requests leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9513", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735741" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker, using PRIORITY frames to flood the system, could cause excessive CPU usage and starvation of other clients. The largest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PRIORITY frames results in excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for packages nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el6.1.src", "6Server-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-httpd-manual-0:2.4.34-8.el6.1.noarch", "6Server-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el6.1.src", "6Server-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el6.1.src", "6Workstation-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-httpd-manual-0:2.4.34-8.el6.1.noarch", "6Workstation-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el6.1.src", "6Workstation-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el6.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.src", "7Server-Alt-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-manual-0:2.4.34-8.el7.1.noarch", "7Server-Alt-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.src", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-0:2.4.34-8.el7.1.src", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-manual-0:2.4.34-8.el7.1.noarch", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_md-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_md-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_md-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_session-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_session-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_session-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.src", "7Server-RHSCL-3.3-7.5.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-0:2.4.34-8.el7.1.src", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-manual-0:2.4.34-8.el7.1.noarch", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_md-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_md-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_md-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_session-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_session-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_session-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.src", "7Server-RHSCL-3.3-7.6.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-0:2.4.34-8.el7.1.src", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-manual-0:2.4.34-8.el7.1.noarch", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_md-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_md-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_md-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_session-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_session-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_session-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.src", "7Server-RHSCL-3.3-7.7.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.src", "7Server-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-httpd-manual-0:2.4.34-8.el7.1.noarch", "7Server-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.src", "7Server-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.src", "7Workstation-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-httpd-manual-0:2.4.34-8.el7.1.noarch", "7Workstation-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.src", "7Workstation-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9513" }, { "category": "external", "summary": "RHBZ#1735741", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735741" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9513", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9513" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9513", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9513" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nghttp2.org/blog/2019/08/19/nghttp2-v1-39-2/", "url": "https://nghttp2.org/blog/2019/08/19/nghttp2-v1-39-2/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-01T16:14:19+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "6Server-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el6.1.src", "6Server-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-httpd-manual-0:2.4.34-8.el6.1.noarch", "6Server-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el6.1.src", "6Server-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el6.1.src", "6Workstation-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-httpd-manual-0:2.4.34-8.el6.1.noarch", "6Workstation-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el6.1.src", "6Workstation-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el6.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.src", "7Server-Alt-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-manual-0:2.4.34-8.el7.1.noarch", "7Server-Alt-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.src", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-0:2.4.34-8.el7.1.src", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-manual-0:2.4.34-8.el7.1.noarch", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_md-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_md-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_md-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_session-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_session-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_session-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.src", "7Server-RHSCL-3.3-7.5.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-0:2.4.34-8.el7.1.src", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-manual-0:2.4.34-8.el7.1.noarch", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_md-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_md-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_md-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_session-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_session-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_session-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.src", "7Server-RHSCL-3.3-7.6.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-0:2.4.34-8.el7.1.src", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-manual-0:2.4.34-8.el7.1.noarch", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_md-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_md-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_md-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_session-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_session-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_session-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.src", "7Server-RHSCL-3.3-7.7.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.src", "7Server-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-httpd-manual-0:2.4.34-8.el7.1.noarch", "7Server-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.src", "7Server-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.src", "7Workstation-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-httpd-manual-0:2.4.34-8.el7.1.noarch", "7Workstation-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.src", "7Workstation-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2949" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "6Server-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el6.1.src", "6Server-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-httpd-manual-0:2.4.34-8.el6.1.noarch", "6Server-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el6.1.src", "6Server-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el6.1.src", "6Workstation-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-httpd-manual-0:2.4.34-8.el6.1.noarch", "6Workstation-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el6.1.src", "6Workstation-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el6.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.src", "7Server-Alt-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-manual-0:2.4.34-8.el7.1.noarch", "7Server-Alt-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.src", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-0:2.4.34-8.el7.1.src", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-manual-0:2.4.34-8.el7.1.noarch", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_md-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_md-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_md-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_session-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_session-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_session-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.src", "7Server-RHSCL-3.3-7.5.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-0:2.4.34-8.el7.1.src", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-manual-0:2.4.34-8.el7.1.noarch", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_md-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_md-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_md-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_session-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_session-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_session-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.src", "7Server-RHSCL-3.3-7.6.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-0:2.4.34-8.el7.1.src", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-manual-0:2.4.34-8.el7.1.noarch", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_md-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_md-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_md-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_session-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_session-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_session-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.src", "7Server-RHSCL-3.3-7.7.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.src", "7Server-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-httpd-manual-0:2.4.34-8.el7.1.noarch", "7Server-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.src", "7Server-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.src", "7Workstation-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-httpd-manual-0:2.4.34-8.el7.1.noarch", "7Workstation-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.src", "7Workstation-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el6.1.src", "6Server-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-httpd-manual-0:2.4.34-8.el6.1.noarch", "6Server-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el6.1.src", "6Server-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el6.1.src", "6Workstation-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-httpd-manual-0:2.4.34-8.el6.1.noarch", "6Workstation-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el6.1.src", "6Workstation-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el6.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.src", "7Server-Alt-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-manual-0:2.4.34-8.el7.1.noarch", "7Server-Alt-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.src", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-0:2.4.34-8.el7.1.src", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-manual-0:2.4.34-8.el7.1.noarch", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_md-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_md-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_md-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_session-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_session-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_session-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.src", "7Server-RHSCL-3.3-7.5.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-0:2.4.34-8.el7.1.src", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-manual-0:2.4.34-8.el7.1.noarch", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_md-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_md-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_md-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_session-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_session-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_session-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.src", "7Server-RHSCL-3.3-7.6.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-0:2.4.34-8.el7.1.src", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-manual-0:2.4.34-8.el7.1.noarch", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_md-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_md-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_md-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_session-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_session-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_session-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.src", "7Server-RHSCL-3.3-7.7.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.src", "7Server-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-httpd-manual-0:2.4.34-8.el7.1.noarch", "7Server-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.src", "7Server-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.src", "7Workstation-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-httpd-manual-0:2.4.34-8.el7.1.noarch", "7Workstation-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.src", "7Workstation-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PRIORITY frames results in excessive resource consumption" }, { "cve": "CVE-2019-9517", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741868" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in HTTP/2. An attacker can open a HTTP/2 window so the peer can send without constraint. The TCP window remains closed so the peer cannot write the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the server\u0027s queue is setup, the responses can consume excess memory, CPU, or both, potentially leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: request for large response leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "The package httpd versions as shipped with Red Hat Enterprise Linux 5, 6 and 7 are not affected by this issue as HTTP/2 support is not provided.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el6.1.src", "6Server-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-httpd-manual-0:2.4.34-8.el6.1.noarch", "6Server-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el6.1.src", "6Server-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el6.1.src", "6Workstation-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-httpd-manual-0:2.4.34-8.el6.1.noarch", "6Workstation-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el6.1.src", "6Workstation-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el6.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.src", "7Server-Alt-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-manual-0:2.4.34-8.el7.1.noarch", "7Server-Alt-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.src", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-0:2.4.34-8.el7.1.src", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-manual-0:2.4.34-8.el7.1.noarch", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_md-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_md-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_md-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_session-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_session-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_session-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.src", "7Server-RHSCL-3.3-7.5.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-0:2.4.34-8.el7.1.src", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-manual-0:2.4.34-8.el7.1.noarch", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_md-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_md-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_md-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_session-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_session-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_session-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.src", "7Server-RHSCL-3.3-7.6.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-0:2.4.34-8.el7.1.src", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-manual-0:2.4.34-8.el7.1.noarch", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_md-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_md-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_md-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_session-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_session-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_session-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.src", "7Server-RHSCL-3.3-7.7.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.src", "7Server-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-httpd-manual-0:2.4.34-8.el7.1.noarch", "7Server-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.src", "7Server-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.src", "7Workstation-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-httpd-manual-0:2.4.34-8.el7.1.noarch", "7Workstation-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.src", "7Workstation-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9517" }, { "category": "external", "summary": "RHBZ#1741868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741868" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9517", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9517" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9517", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9517" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-01T16:14:19+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "6Server-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el6.1.src", "6Server-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-httpd-manual-0:2.4.34-8.el6.1.noarch", "6Server-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el6.1.src", "6Server-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el6.1.src", "6Workstation-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-httpd-manual-0:2.4.34-8.el6.1.noarch", "6Workstation-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el6.1.src", "6Workstation-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el6.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.src", "7Server-Alt-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-manual-0:2.4.34-8.el7.1.noarch", "7Server-Alt-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.src", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-0:2.4.34-8.el7.1.src", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-manual-0:2.4.34-8.el7.1.noarch", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_md-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_md-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_md-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_session-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_session-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_session-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.src", "7Server-RHSCL-3.3-7.5.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-0:2.4.34-8.el7.1.src", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-manual-0:2.4.34-8.el7.1.noarch", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_md-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_md-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_md-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_session-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_session-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_session-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.src", "7Server-RHSCL-3.3-7.6.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-0:2.4.34-8.el7.1.src", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-manual-0:2.4.34-8.el7.1.noarch", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_md-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_md-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_md-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_session-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_session-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_session-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.src", "7Server-RHSCL-3.3-7.7.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.src", "7Server-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-httpd-manual-0:2.4.34-8.el7.1.noarch", "7Server-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.src", "7Server-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.src", "7Workstation-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-httpd-manual-0:2.4.34-8.el7.1.noarch", "7Workstation-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.src", "7Workstation-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2949" }, { "category": "workaround", "details": "The httpd version shipped with Red Hat Enterprise Linux 8 provides HTTP/2 support through mod_http2 package. While mod_http2 package is not updated, users can disable HTTP/2 support as mitigation action by executing the following steps:\n\n1. Stop httpd service:\n$ systemctl stop httpd\n\n2. Remove http/2 protocol support from configuration files:\n$ sed -i \u0027s/\\(h2\\)\\|\\(h2c\\)//g\u0027 \u003chttpd_config_file\u003e\n\n3. Validate configuration files to make sure all syntax is valid:\n$ apachectl configtest\n\n4. Restart httpd service:\n$ systemctl start httpd", "product_ids": [ "6Server-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el6.1.src", "6Server-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-httpd-manual-0:2.4.34-8.el6.1.noarch", "6Server-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el6.1.src", "6Server-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el6.1.src", "6Workstation-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-httpd-manual-0:2.4.34-8.el6.1.noarch", "6Workstation-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el6.1.src", "6Workstation-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el6.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.src", "7Server-Alt-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-manual-0:2.4.34-8.el7.1.noarch", "7Server-Alt-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.src", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-0:2.4.34-8.el7.1.src", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-manual-0:2.4.34-8.el7.1.noarch", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_md-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_md-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_md-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_session-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_session-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_session-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.src", "7Server-RHSCL-3.3-7.5.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-0:2.4.34-8.el7.1.src", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-manual-0:2.4.34-8.el7.1.noarch", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_md-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_md-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_md-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_session-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_session-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_session-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.src", "7Server-RHSCL-3.3-7.6.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-0:2.4.34-8.el7.1.src", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-manual-0:2.4.34-8.el7.1.noarch", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_md-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_md-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_md-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_session-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_session-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_session-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.src", "7Server-RHSCL-3.3-7.7.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.src", "7Server-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-httpd-manual-0:2.4.34-8.el7.1.noarch", "7Server-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.src", "7Server-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.src", "7Workstation-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-httpd-manual-0:2.4.34-8.el7.1.noarch", "7Workstation-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.src", "7Workstation-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el6.1.src", "6Server-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-httpd-manual-0:2.4.34-8.el6.1.noarch", "6Server-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el6.1.src", "6Server-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el6.1.x86_64", "6Server-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el6.1.src", "6Workstation-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-httpd-manual-0:2.4.34-8.el6.1.noarch", "6Workstation-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el6.1.src", "6Workstation-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el6.1.x86_64", "6Workstation-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el6.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.src", "7Server-Alt-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-manual-0:2.4.34-8.el7.1.noarch", "7Server-Alt-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.src", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.aarch64", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.ppc64le", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.s390x", "7Server-Alt-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-0:2.4.34-8.el7.1.src", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-manual-0:2.4.34-8.el7.1.noarch", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_md-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_md-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_md-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_session-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_session-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_session-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.src", "7Server-RHSCL-3.3-7.5.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.5.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.5.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.5.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-0:2.4.34-8.el7.1.src", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-manual-0:2.4.34-8.el7.1.noarch", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_md-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_md-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_md-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_session-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_session-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_session-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.src", "7Server-RHSCL-3.3-7.6.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.6.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.6.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.6.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-0:2.4.34-8.el7.1.src", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-devel-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-manual-0:2.4.34-8.el7.1.noarch", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-httpd-tools-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-libnghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_ldap-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_md-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_md-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_md-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_session-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_session-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_session-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-mod_ssl-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.src", "7Server-RHSCL-3.3-7.7.Z:httpd24-nghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3-7.7.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3-7.7.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3-7.7.Z:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.src", "7Server-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-httpd-manual-0:2.4.34-8.el7.1.noarch", "7Server-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.src", "7Server-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.x86_64", "7Server-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.aarch64", "7Server-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.ppc64le", "7Server-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.s390x", "7Server-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.src", "7Workstation-RHSCL-3.3:httpd24-httpd-0:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-httpd-debuginfo-0:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-httpd-devel-0:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-httpd-manual-0:2.4.34-8.el7.1.noarch", "7Workstation-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-httpd-tools-0:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-0:1.7.1-7.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-libnghttp2-devel-0:1.7.1-7.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-mod_ldap-0:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-mod_md-0:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-mod_proxy_html-1:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-mod_session-0:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-mod_ssl-1:2.4.34-8.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.src", "7Workstation-RHSCL-3.3:httpd24-nghttp2-0:1.7.1-7.el7.1.x86_64", "7Workstation-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.aarch64", "7Workstation-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.ppc64le", "7Workstation-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.s390x", "7Workstation-RHSCL-3.3:httpd24-nghttp2-debuginfo-0:1.7.1-7.el7.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: request for large response leads to denial of service" } ] }
rhsa-2019:2955
Vulnerability from csaf_redhat
Published
2019-10-02 14:29
Modified
2025-08-07 09:56
Summary
Red Hat Security Advisory: rh-nodejs8-nodejs security update
Notes
Topic
An update for rh-nodejs8-nodejs is now available for Red Hat Software Collections.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: rh-nodejs8-nodejs (8.16.1).
Security Fix(es):
* HTTP/2: large amount of data requests leads to denial of service (CVE-2019-9511)
* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)
* HTTP/2: flood using PRIORITY frames results in excessive resource consumption (CVE-2019-9513)
* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)
* HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)
* HTTP/2: 0-length headers lead to denial of service (CVE-2019-9516)
* HTTP/2: request for large response leads to denial of service (CVE-2019-9517)
* HTTP/2: flood using empty frames results in excessive resource consumption (CVE-2019-9518)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for rh-nodejs8-nodejs is now available for Red Hat Software Collections.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.\n\nThe following packages have been upgraded to a later upstream version: rh-nodejs8-nodejs (8.16.1).\n\nSecurity Fix(es):\n\n* HTTP/2: large amount of data requests leads to denial of service (CVE-2019-9511)\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using PRIORITY frames results in excessive resource consumption (CVE-2019-9513)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\n* HTTP/2: 0-length headers lead to denial of service (CVE-2019-9516)\n\n* HTTP/2: request for large response leads to denial of service (CVE-2019-9517)\n\n* HTTP/2: flood using empty frames results in excessive resource consumption (CVE-2019-9518)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:2955", "url": "https://access.redhat.com/errata/RHSA-2019:2955" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735741", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735741" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "1741864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741864" }, { "category": "external", "summary": "1741868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741868" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2955.json" } ], "title": "Red Hat Security Advisory: rh-nodejs8-nodejs security update", "tracking": { "current_release_date": "2025-08-07T09:56:18+00:00", "generator": { "date": "2025-08-07T09:56:18+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2019:2955", "initial_release_date": "2019-10-02T14:29:13+00:00", "revision_history": [ { "date": "2019-10-02T14:29:13+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-10-02T14:29:13+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-07T09:56:18+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } } ], "category": "product_family", "name": "Red Hat Software Collections" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs8-0:3.0-5.el7.ppc64le", "product": { "name": "rh-nodejs8-0:3.0-5.el7.ppc64le", "product_id": "rh-nodejs8-0:3.0-5.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs8@3.0-5.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "product": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "product_id": "rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs8-runtime@3.0-5.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "product": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "product_id": "rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs8-scldevel@3.0-5.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "product": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "product_id": "rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs8-nodejs@8.16.1-2.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "product": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "product_id": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs8-nodejs-devel@8.16.1-2.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "product": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "product_id": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs8-npm@6.4.1-8.16.1.2.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "product": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "product_id": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs8-nodejs-debuginfo@8.16.1-2.el7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs8-0:3.0-5.el7.s390x", "product": { "name": "rh-nodejs8-0:3.0-5.el7.s390x", "product_id": "rh-nodejs8-0:3.0-5.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs8@3.0-5.el7?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs8-runtime-0:3.0-5.el7.s390x", "product": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.s390x", "product_id": "rh-nodejs8-runtime-0:3.0-5.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs8-runtime@3.0-5.el7?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "product": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "product_id": "rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs8-scldevel@3.0-5.el7?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "product": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "product_id": "rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs8-nodejs@8.16.1-2.el7?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "product": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "product_id": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs8-nodejs-devel@8.16.1-2.el7?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "product": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "product_id": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs8-npm@6.4.1-8.16.1.2.el7?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "product": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "product_id": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs8-nodejs-debuginfo@8.16.1-2.el7?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs8-0:3.0-5.el7.aarch64", "product": { "name": "rh-nodejs8-0:3.0-5.el7.aarch64", "product_id": "rh-nodejs8-0:3.0-5.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs8@3.0-5.el7?arch=aarch64" } } }, { "category": "product_version", "name": "rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "product": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "product_id": "rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs8-runtime@3.0-5.el7?arch=aarch64" } } }, { "category": "product_version", "name": "rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "product": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "product_id": "rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs8-scldevel@3.0-5.el7?arch=aarch64" } } }, { "category": "product_version", "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "product": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "product_id": "rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs8-nodejs@8.16.1-2.el7?arch=aarch64" } } }, { "category": "product_version", "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "product": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "product_id": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs8-nodejs-devel@8.16.1-2.el7?arch=aarch64" } } }, { "category": "product_version", "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "product": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "product_id": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs8-npm@6.4.1-8.16.1.2.el7?arch=aarch64" } } }, { "category": "product_version", "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "product": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "product_id": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs8-nodejs-debuginfo@8.16.1-2.el7?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs8-0:3.0-5.el7.src", "product": { "name": "rh-nodejs8-0:3.0-5.el7.src", "product_id": "rh-nodejs8-0:3.0-5.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs8@3.0-5.el7?arch=src" } } }, { "category": "product_version", "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "product": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "product_id": "rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs8-nodejs@8.16.1-2.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs8-0:3.0-5.el7.x86_64", "product": { "name": "rh-nodejs8-0:3.0-5.el7.x86_64", "product_id": "rh-nodejs8-0:3.0-5.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs8@3.0-5.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "product": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "product_id": "rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs8-runtime@3.0-5.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "product": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "product_id": "rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs8-scldevel@3.0-5.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "product": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "product_id": "rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs8-nodejs@8.16.1-2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "product": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "product_id": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs8-nodejs-devel@8.16.1-2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "product": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "product_id": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs8-npm@6.4.1-8.16.1.2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "product": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "product_id": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs8-nodejs-debuginfo@8.16.1-2.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "product": { "name": "rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "product_id": "rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs8-nodejs-docs@8.16.1-2.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.src", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch" }, "product_reference": "rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch" }, "product_reference": "rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch" }, "product_reference": "rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch" }, "product_reference": "rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch" }, "product_reference": "rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.src", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch" }, "product_reference": "rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-9511", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741860" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker can request a large amount of data by manipulating window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this queue can consume excess CPU, memory, or both, leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: large amount of data requests leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "There are no mitigations available for nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9511" }, { "category": "external", "summary": "RHBZ#1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9511", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9511" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-02T14:29:13+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2955" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: large amount of data requests leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-02T14:29:13+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2955" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9513", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735741" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker, using PRIORITY frames to flood the system, could cause excessive CPU usage and starvation of other clients. The largest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PRIORITY frames results in excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for packages nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9513" }, { "category": "external", "summary": "RHBZ#1735741", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735741" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9513", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9513" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9513", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9513" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nghttp2.org/blog/2019/08/19/nghttp2-v1-39-2/", "url": "https://nghttp2.org/blog/2019/08/19/nghttp2-v1-39-2/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-02T14:29:13+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2955" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PRIORITY frames results in excessive resource consumption" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-02T14:29:13+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2955" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-02T14:29:13+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2955" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "cve": "CVE-2019-9516", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741864" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker, sending a stream of header with a 0-length header name and a 0-length header value, could cause some implementations to allocate memory for these headers and keep the allocations alive until the session dies. The can consume excess memory, potentially leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: 0-length headers lead to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9516" }, { "category": "external", "summary": "RHBZ#1741864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741864" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9516", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9516" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9516", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9516" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://github.com/nghttp2/nghttp2/issues/1382#", "url": "https://github.com/nghttp2/nghttp2/issues/1382#" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-02T14:29:13+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2955" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: 0-length headers lead to denial of service" }, { "cve": "CVE-2019-9517", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741868" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in HTTP/2. An attacker can open a HTTP/2 window so the peer can send without constraint. The TCP window remains closed so the peer cannot write the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the server\u0027s queue is setup, the responses can consume excess memory, CPU, or both, potentially leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: request for large response leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "The package httpd versions as shipped with Red Hat Enterprise Linux 5, 6 and 7 are not affected by this issue as HTTP/2 support is not provided.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9517" }, { "category": "external", "summary": "RHBZ#1741868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741868" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9517", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9517" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9517", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9517" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-02T14:29:13+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2955" }, { "category": "workaround", "details": "The httpd version shipped with Red Hat Enterprise Linux 8 provides HTTP/2 support through mod_http2 package. While mod_http2 package is not updated, users can disable HTTP/2 support as mitigation action by executing the following steps:\n\n1. Stop httpd service:\n$ systemctl stop httpd\n\n2. Remove http/2 protocol support from configuration files:\n$ sed -i \u0027s/\\(h2\\)\\|\\(h2c\\)//g\u0027 \u003chttpd_config_file\u003e\n\n3. Validate configuration files to make sure all syntax is valid:\n$ apachectl configtest\n\n4. Restart httpd service:\n$ systemctl start httpd", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: request for large response leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9518", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735749" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using frames with an empty payload, a flood could occur that results in excessive CPU usage and starvation of other clients. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using empty frames results in excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9518" }, { "category": "external", "summary": "RHBZ#1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9518", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9518" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-02T14:29:13+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2955" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using empty frames results in excessive resource consumption" } ] }
ghsa-w6v5-q8c8-52xx
Vulnerability from github
Published
2022-05-24 16:53
Modified
2025-01-14 21:31
Severity ?
VLAI Severity ?
Details
Some HTTP/2 implementations are vulnerable to unconstrained interal data buffering, potentially leading to a denial of service. The attacker opens the HTTP/2 window so the peer can send without constraint; however, they leave the TCP window closed so the peer cannot actually write (many of) the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the servers queue the responses, this can consume excess memory, CPU, or both.
{ "affected": [], "aliases": [ "CVE-2019-9517" ], "database_specific": { "cwe_ids": [ "CWE-400", "CWE-770" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2019-08-13T21:15:00Z", "severity": "HIGH" }, "details": "Some HTTP/2 implementations are vulnerable to unconstrained interal data buffering, potentially leading to a denial of service. The attacker opens the HTTP/2 window so the peer can send without constraint; however, they leave the TCP window closed so the peer cannot actually write (many of) the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the servers queue the responses, this can consume excess memory, CPU, or both.", "id": "GHSA-w6v5-q8c8-52xx", "modified": "2025-01-14T21:31:41Z", "published": "2022-05-24T16:53:21Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9517" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BP556LEG3WENHZI5TAQ6ZEBFTJB4E2IS" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XHTKU7YQ5EEP2XNSAV4M4VJ7QCBOJMOD" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BP556LEG3WENHZI5TAQ6ZEBFTJB4E2IS" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538%40%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:2893" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XHTKU7YQ5EEP2XNSAV4M4VJ7QCBOJMOD" }, { "type": "WEB", "url": "https://seclists.org/bugtraq/2019/Aug/47" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/201909-04" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20190823-0003" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20190823-0005" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20190905-0003" }, { "type": "WEB", "url": "https://support.f5.com/csp/article/K02591030" }, { "type": "WEB", "url": "https://support.f5.com/csp/article/K02591030?utm_source=f5support\u0026amp%3Butm_medium=RSS" }, { "type": "WEB", "url": "https://support.f5.com/csp/article/K02591030?utm_source=f5support\u0026amp;utm_medium=RSS" }, { "type": "WEB", "url": "https://usn.ubuntu.com/4113-1" }, { "type": "WEB", "url": "https://www.debian.org/security/2019/dsa-4509" }, { "type": "WEB", "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "type": "WEB", "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html" }, { "type": "WEB", "url": "https://www.synology.com/security/advisory/Synology_SA_19_33" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:2925" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:2939" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:2946" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:2949" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:2950" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:2955" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:3932" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:3933" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:3935" }, { "type": "WEB", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "type": "WEB", "url": "https://kb.cert.org/vuls/id/605641" }, { "type": "WEB", "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10296" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/4610762456644181b267c846423b3a990bd4aaea1886ecc7d51febdb%40%3Cannounce.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/4610762456644181b267c846423b3a990bd4aaea1886ecc7d51febdb@%3Cannounce.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/d89f999e26dfb1d50f247ead1fe8538014eb412b2dbe5be4b1a9ef50%40%3Cdev.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/d89f999e26dfb1d50f247ead1fe8538014eb412b2dbe5be4b1a9ef50@%3Cdev.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/ec97fdfc1a859266e56fef084353a34e0a0b08901b3c1aa317a43c8c%40%3Cdev.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/ec97fdfc1a859266e56fef084353a34e0a0b08901b3c1aa317a43c8c@%3Cdev.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d%40%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36%40%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00004.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2019/08/15/7" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ] }
opensuse-su-2024:10623-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
apache2-2.4.49-1.1 on GA media
Notes
Title of the patch
apache2-2.4.49-1.1 on GA media
Description of the patch
These are all security issues fixed in the apache2-2.4.49-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-10623
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "apache2-2.4.49-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the apache2-2.4.49-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-10623", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10623-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2005-3352 page", "url": "https://www.suse.com/security/cve/CVE-2005-3352/" }, { "category": "self", "summary": "SUSE CVE CVE-2005-3357 page", "url": "https://www.suse.com/security/cve/CVE-2005-3357/" }, { "category": "self", "summary": "SUSE CVE CVE-2006-3747 page", "url": "https://www.suse.com/security/cve/CVE-2006-3747/" }, { "category": "self", "summary": "SUSE CVE CVE-2006-5752 page", "url": "https://www.suse.com/security/cve/CVE-2006-5752/" }, { "category": "self", "summary": "SUSE CVE CVE-2007-1862 page", "url": "https://www.suse.com/security/cve/CVE-2007-1862/" }, { "category": "self", "summary": "SUSE CVE CVE-2007-1863 page", "url": "https://www.suse.com/security/cve/CVE-2007-1863/" }, { "category": "self", "summary": "SUSE CVE CVE-2007-3304 page", "url": "https://www.suse.com/security/cve/CVE-2007-3304/" }, { "category": "self", "summary": "SUSE CVE CVE-2007-3847 page", "url": "https://www.suse.com/security/cve/CVE-2007-3847/" }, { "category": "self", "summary": "SUSE CVE CVE-2007-4465 page", "url": "https://www.suse.com/security/cve/CVE-2007-4465/" }, { "category": "self", "summary": "SUSE CVE CVE-2007-5000 page", "url": "https://www.suse.com/security/cve/CVE-2007-5000/" }, { "category": "self", "summary": "SUSE CVE CVE-2007-6388 page", "url": "https://www.suse.com/security/cve/CVE-2007-6388/" }, { "category": "self", "summary": "SUSE CVE CVE-2007-6420 page", "url": "https://www.suse.com/security/cve/CVE-2007-6420/" }, { "category": "self", "summary": "SUSE CVE CVE-2007-6421 page", "url": "https://www.suse.com/security/cve/CVE-2007-6421/" }, { "category": "self", "summary": "SUSE CVE CVE-2007-6422 page", "url": "https://www.suse.com/security/cve/CVE-2007-6422/" }, { "category": "self", "summary": "SUSE CVE CVE-2008-0005 page", "url": "https://www.suse.com/security/cve/CVE-2008-0005/" }, { "category": "self", "summary": "SUSE CVE CVE-2008-1678 page", "url": "https://www.suse.com/security/cve/CVE-2008-1678/" }, { "category": "self", "summary": "SUSE CVE CVE-2008-2364 page", "url": "https://www.suse.com/security/cve/CVE-2008-2364/" }, { "category": "self", "summary": "SUSE CVE CVE-2008-2939 page", "url": "https://www.suse.com/security/cve/CVE-2008-2939/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5387 page", "url": "https://www.suse.com/security/cve/CVE-2016-5387/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8740 page", "url": "https://www.suse.com/security/cve/CVE-2016-8740/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-9798 page", "url": "https://www.suse.com/security/cve/CVE-2017-9798/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-10081 page", "url": "https://www.suse.com/security/cve/CVE-2019-10081/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-10082 page", "url": "https://www.suse.com/security/cve/CVE-2019-10082/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-10092 page", "url": "https://www.suse.com/security/cve/CVE-2019-10092/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-10097 page", "url": "https://www.suse.com/security/cve/CVE-2019-10097/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-10098 page", "url": "https://www.suse.com/security/cve/CVE-2019-10098/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9517 page", "url": "https://www.suse.com/security/cve/CVE-2019-9517/" } ], "title": "apache2-2.4.49-1.1 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:10623-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "apache2-2.4.49-1.1.aarch64", "product": { "name": "apache2-2.4.49-1.1.aarch64", "product_id": "apache2-2.4.49-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "apache2-2.4.49-1.1.ppc64le", "product": { "name": "apache2-2.4.49-1.1.ppc64le", "product_id": "apache2-2.4.49-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "apache2-2.4.49-1.1.s390x", "product": { "name": "apache2-2.4.49-1.1.s390x", "product_id": "apache2-2.4.49-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "apache2-2.4.49-1.1.x86_64", "product": { "name": "apache2-2.4.49-1.1.x86_64", "product_id": "apache2-2.4.49-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "apache2-2.4.49-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:apache2-2.4.49-1.1.aarch64" }, "product_reference": "apache2-2.4.49-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-2.4.49-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:apache2-2.4.49-1.1.ppc64le" }, "product_reference": "apache2-2.4.49-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-2.4.49-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:apache2-2.4.49-1.1.s390x" }, "product_reference": "apache2-2.4.49-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-2.4.49-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:apache2-2.4.49-1.1.x86_64" }, "product_reference": "apache2-2.4.49-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2005-3352", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2005-3352" } ], "notes": [ { "category": "general", "text": "Cross-site scripting (XSS) vulnerability in the mod_imap module of Apache httpd before 1.3.35-dev and Apache httpd 2.0.x before 2.0.56-dev allows remote attackers to inject arbitrary web script or HTML via the Referer when using image maps.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:apache2-2.4.49-1.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.49-1.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.49-1.1.s390x", "openSUSE Tumbleweed:apache2-2.4.49-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2005-3352", "url": "https://www.suse.com/security/cve/CVE-2005-3352" }, { "category": "external", "summary": "SUSE Bug 138083 for CVE-2005-3352", "url": "https://bugzilla.suse.com/138083" }, { "category": "external", "summary": "SUSE Bug 142507 for CVE-2005-3352", "url": "https://bugzilla.suse.com/142507" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:apache2-2.4.49-1.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.49-1.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.49-1.1.s390x", "openSUSE Tumbleweed:apache2-2.4.49-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2005-3352" }, { "cve": "CVE-2005-3357", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2005-3357" } ], "notes": [ { "category": "general", "text": "mod_ssl in Apache 2.0 up to 2.0.55, when configured with an SSL vhost with access control and a custom error 400 error page, allows remote attackers to cause a denial of service (application crash) via a non-SSL request to an SSL port, which triggers a NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:apache2-2.4.49-1.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.49-1.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.49-1.1.s390x", "openSUSE Tumbleweed:apache2-2.4.49-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2005-3357", "url": "https://www.suse.com/security/cve/CVE-2005-3357" }, { "category": "external", "summary": "SUSE Bug 138083 for CVE-2005-3357", "url": "https://bugzilla.suse.com/138083" }, { "category": "external", "summary": "SUSE Bug 142338 for CVE-2005-3357", "url": "https://bugzilla.suse.com/142338" }, { "category": "external", "summary": "SUSE Bug 186167 for CVE-2005-3357", "url": "https://bugzilla.suse.com/186167" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:apache2-2.4.49-1.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.49-1.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.49-1.1.s390x", "openSUSE Tumbleweed:apache2-2.4.49-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2005-3357" }, { "cve": "CVE-2006-3747", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2006-3747" } ], "notes": [ { "category": "general", "text": "Off-by-one error in the ldap scheme handling in the Rewrite module (mod_rewrite) in Apache 1.3 from 1.3.28, 2.0.46 and other versions before 2.0.59, and 2.2, when RewriteEngine is enabled, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted URLs that are not properly handled using certain rewrite rules.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:apache2-2.4.49-1.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.49-1.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.49-1.1.s390x", "openSUSE Tumbleweed:apache2-2.4.49-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2006-3747", "url": "https://www.suse.com/security/cve/CVE-2006-3747" }, { "category": "external", "summary": "SUSE Bug 194675 for CVE-2006-3747", "url": "https://bugzilla.suse.com/194675" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:apache2-2.4.49-1.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.49-1.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.49-1.1.s390x", "openSUSE Tumbleweed:apache2-2.4.49-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2006-3747" }, { "cve": "CVE-2006-5752", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2006-5752" } ], "notes": [ { "category": "general", "text": "Cross-site scripting (XSS) vulnerability in mod_status.c in the mod_status module in Apache HTTP Server (httpd), when ExtendedStatus is enabled and a public server-status page is used, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors involving charsets with browsers that perform \"charset detection\" when the content-type is not specified.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:apache2-2.4.49-1.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.49-1.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.49-1.1.s390x", "openSUSE Tumbleweed:apache2-2.4.49-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2006-5752", "url": "https://www.suse.com/security/cve/CVE-2006-5752" }, { "category": "external", "summary": "SUSE Bug 289996 for CVE-2006-5752", "url": "https://bugzilla.suse.com/289996" }, { "category": "external", "summary": "SUSE Bug 308637 for CVE-2006-5752", "url": "https://bugzilla.suse.com/308637" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:apache2-2.4.49-1.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.49-1.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.49-1.1.s390x", "openSUSE Tumbleweed:apache2-2.4.49-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2006-5752" }, { "cve": "CVE-2007-1862", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2007-1862" } ], "notes": [ { "category": "general", "text": "The recall_headers function in mod_mem_cache in Apache 2.2.4 does not properly copy all levels of header data, which can cause Apache to return HTTP headers containing previously used data, which could be used by remote attackers to obtain potentially sensitive information.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:apache2-2.4.49-1.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.49-1.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.49-1.1.s390x", "openSUSE Tumbleweed:apache2-2.4.49-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2007-1862", "url": "https://www.suse.com/security/cve/CVE-2007-1862" }, { "category": "external", "summary": "SUSE Bug 280414 for CVE-2007-1862", "url": "https://bugzilla.suse.com/280414" }, { "category": "external", "summary": "SUSE Bug 308637 for CVE-2007-1862", "url": "https://bugzilla.suse.com/308637" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:apache2-2.4.49-1.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.49-1.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.49-1.1.s390x", "openSUSE Tumbleweed:apache2-2.4.49-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2007-1862" }, { "cve": "CVE-2007-1863", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2007-1863" } ], "notes": [ { "category": "general", "text": "cache_util.c in the mod_cache module in Apache HTTP Server (httpd), when caching is enabled and a threaded Multi-Processing Module (MPM) is used, allows remote attackers to cause a denial of service (child processing handler crash) via a request with the (1) s-maxage, (2) max-age, (3) min-fresh, or (4) max-stale Cache-Control headers without a value.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:apache2-2.4.49-1.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.49-1.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.49-1.1.s390x", "openSUSE Tumbleweed:apache2-2.4.49-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2007-1863", "url": "https://www.suse.com/security/cve/CVE-2007-1863" }, { "category": "external", "summary": "SUSE Bug 289997 for CVE-2007-1863", "url": "https://bugzilla.suse.com/289997" }, { "category": "external", "summary": "SUSE Bug 308637 for CVE-2007-1863", "url": "https://bugzilla.suse.com/308637" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:apache2-2.4.49-1.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.49-1.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.49-1.1.s390x", "openSUSE Tumbleweed:apache2-2.4.49-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2007-1863" }, { "cve": "CVE-2007-3304", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2007-3304" } ], "notes": [ { "category": "general", "text": "Apache httpd 1.3.37, 2.0.59, and 2.2.4 with the Prefork MPM module, allows local users to cause a denial of service by modifying the worker_score and process_score arrays to reference an arbitrary process ID, which is sent a SIGUSR1 signal from the master process, aka \"SIGUSR1 killer.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:apache2-2.4.49-1.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.49-1.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.49-1.1.s390x", "openSUSE Tumbleweed:apache2-2.4.49-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2007-3304", "url": "https://www.suse.com/security/cve/CVE-2007-3304" }, { "category": "external", "summary": "SUSE Bug 286685 for CVE-2007-3304", "url": "https://bugzilla.suse.com/286685" }, { "category": "external", "summary": "SUSE Bug 308637 for CVE-2007-3304", "url": "https://bugzilla.suse.com/308637" }, { "category": "external", "summary": "SUSE Bug 422464 for CVE-2007-3304", "url": "https://bugzilla.suse.com/422464" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:apache2-2.4.49-1.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.49-1.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.49-1.1.s390x", "openSUSE Tumbleweed:apache2-2.4.49-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2007-3304" }, { "cve": "CVE-2007-3847", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2007-3847" } ], "notes": [ { "category": "general", "text": "The date handling code in modules/proxy/proxy_util.c (mod_proxy) in Apache 2.3.0, when using a threaded MPM, allows remote origin servers to cause a denial of service (caching forward proxy process crash) via crafted date headers that trigger a buffer over-read.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:apache2-2.4.49-1.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.49-1.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.49-1.1.s390x", "openSUSE Tumbleweed:apache2-2.4.49-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2007-3847", "url": "https://www.suse.com/security/cve/CVE-2007-3847" }, { "category": "external", "summary": "SUSE Bug 308637 for CVE-2007-3847", "url": "https://bugzilla.suse.com/308637" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:apache2-2.4.49-1.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.49-1.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.49-1.1.s390x", "openSUSE Tumbleweed:apache2-2.4.49-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2007-3847" }, { "cve": "CVE-2007-4465", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2007-4465" } ], "notes": [ { "category": "general", "text": "Cross-site scripting (XSS) vulnerability in mod_autoindex.c in the Apache HTTP Server before 2.2.6, when the charset on a server-generated page is not defined, allows remote attackers to inject arbitrary web script or HTML via the P parameter using the UTF-7 charset. NOTE: it could be argued that this issue is due to a design limitation of browsers that attempt to perform automatic content type detection.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:apache2-2.4.49-1.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.49-1.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.49-1.1.s390x", "openSUSE Tumbleweed:apache2-2.4.49-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2007-4465", "url": "https://www.suse.com/security/cve/CVE-2007-4465" }, { "category": "external", "summary": "SUSE Bug 308637 for CVE-2007-4465", "url": "https://bugzilla.suse.com/308637" }, { "category": "external", "summary": "SUSE Bug 310161 for CVE-2007-4465", "url": "https://bugzilla.suse.com/310161" }, { "category": "external", "summary": "SUSE Bug 325655 for CVE-2007-4465", "url": "https://bugzilla.suse.com/325655" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:apache2-2.4.49-1.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.49-1.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.49-1.1.s390x", "openSUSE Tumbleweed:apache2-2.4.49-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2007-4465" }, { "cve": "CVE-2007-5000", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2007-5000" } ], "notes": [ { "category": "general", "text": "Cross-site scripting (XSS) vulnerability in the (1) mod_imap module in the Apache HTTP Server 1.3.0 through 1.3.39 and 2.0.35 through 2.0.61 and the (2) mod_imagemap module in the Apache HTTP Server 2.2.0 through 2.2.6 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:apache2-2.4.49-1.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.49-1.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.49-1.1.s390x", "openSUSE Tumbleweed:apache2-2.4.49-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2007-5000", "url": "https://www.suse.com/security/cve/CVE-2007-5000" }, { "category": "external", "summary": "SUSE Bug 353859 for CVE-2007-5000", "url": "https://bugzilla.suse.com/353859" }, { "category": "external", "summary": "SUSE Bug 355888 for CVE-2007-5000", "url": "https://bugzilla.suse.com/355888" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:apache2-2.4.49-1.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.49-1.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.49-1.1.s390x", "openSUSE Tumbleweed:apache2-2.4.49-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2007-5000" }, { "cve": "CVE-2007-6388", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2007-6388" } ], "notes": [ { "category": "general", "text": "Cross-site scripting (XSS) vulnerability in mod_status in the Apache HTTP Server 2.2.0 through 2.2.6, 2.0.35 through 2.0.61, and 1.3.2 through 1.3.39, when the server-status page is enabled, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:apache2-2.4.49-1.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.49-1.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.49-1.1.s390x", "openSUSE Tumbleweed:apache2-2.4.49-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2007-6388", "url": "https://www.suse.com/security/cve/CVE-2007-6388" }, { "category": "external", "summary": "SUSE Bug 352235 for CVE-2007-6388", "url": "https://bugzilla.suse.com/352235" }, { "category": "external", "summary": "SUSE Bug 355888 for CVE-2007-6388", "url": "https://bugzilla.suse.com/355888" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:apache2-2.4.49-1.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.49-1.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.49-1.1.s390x", "openSUSE Tumbleweed:apache2-2.4.49-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2007-6388" }, { "cve": "CVE-2007-6420", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2007-6420" } ], "notes": [ { "category": "general", "text": "Cross-site request forgery (CSRF) vulnerability in the balancer-manager in mod_proxy_balancer for Apache HTTP Server 2.2.x allows remote attackers to gain privileges via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:apache2-2.4.49-1.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.49-1.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.49-1.1.s390x", "openSUSE Tumbleweed:apache2-2.4.49-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2007-6420", "url": "https://www.suse.com/security/cve/CVE-2007-6420" }, { "category": "external", "summary": "SUSE Bug 353261 for CVE-2007-6420", "url": "https://bugzilla.suse.com/353261" }, { "category": "external", "summary": "SUSE Bug 373903 for CVE-2007-6420", "url": "https://bugzilla.suse.com/373903" }, { "category": "external", "summary": "SUSE Bug 422464 for CVE-2007-6420", "url": "https://bugzilla.suse.com/422464" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:apache2-2.4.49-1.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.49-1.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.49-1.1.s390x", "openSUSE Tumbleweed:apache2-2.4.49-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2007-6420" }, { "cve": "CVE-2007-6421", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2007-6421" } ], "notes": [ { "category": "general", "text": "Cross-site scripting (XSS) vulnerability in balancer-manager in mod_proxy_balancer in the Apache HTTP Server 2.2.0 through 2.2.6 allows remote attackers to inject arbitrary web script or HTML via the (1) ss, (2) wr, or (3) rr parameters, or (4) the URL.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:apache2-2.4.49-1.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.49-1.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.49-1.1.s390x", "openSUSE Tumbleweed:apache2-2.4.49-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2007-6421", "url": "https://www.suse.com/security/cve/CVE-2007-6421" }, { "category": "external", "summary": "SUSE Bug 353261 for CVE-2007-6421", "url": "https://bugzilla.suse.com/353261" }, { "category": "external", "summary": "SUSE Bug 355888 for CVE-2007-6421", "url": "https://bugzilla.suse.com/355888" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:apache2-2.4.49-1.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.49-1.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.49-1.1.s390x", "openSUSE Tumbleweed:apache2-2.4.49-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2007-6421" }, { "cve": "CVE-2007-6422", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2007-6422" } ], "notes": [ { "category": "general", "text": "The balancer_handler function in mod_proxy_balancer in the Apache HTTP Server 2.2.0 through 2.2.6, when a threaded Multi-Processing Module is used, allows remote authenticated users to cause a denial of service (child process crash) via an invalid bb variable.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:apache2-2.4.49-1.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.49-1.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.49-1.1.s390x", "openSUSE Tumbleweed:apache2-2.4.49-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2007-6422", "url": "https://www.suse.com/security/cve/CVE-2007-6422" }, { "category": "external", "summary": "SUSE Bug 353261 for CVE-2007-6422", "url": "https://bugzilla.suse.com/353261" }, { "category": "external", "summary": "SUSE Bug 355888 for CVE-2007-6422", "url": "https://bugzilla.suse.com/355888" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:apache2-2.4.49-1.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.49-1.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.49-1.1.s390x", "openSUSE Tumbleweed:apache2-2.4.49-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2007-6422" }, { "cve": "CVE-2008-0005", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2008-0005" } ], "notes": [ { "category": "general", "text": "mod_proxy_ftp in Apache 2.2.x before 2.2.7-dev, 2.0.x before 2.0.62-dev, and 1.3.x before 1.3.40-dev does not define a charset, which allows remote attackers to conduct cross-site scripting (XSS) attacks using UTF-7 encoding.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:apache2-2.4.49-1.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.49-1.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.49-1.1.s390x", "openSUSE Tumbleweed:apache2-2.4.49-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2008-0005", "url": "https://www.suse.com/security/cve/CVE-2008-0005" }, { "category": "external", "summary": "SUSE Bug 353262 for CVE-2008-0005", "url": "https://bugzilla.suse.com/353262" }, { "category": "external", "summary": "SUSE Bug 355888 for CVE-2008-0005", "url": "https://bugzilla.suse.com/355888" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:apache2-2.4.49-1.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.49-1.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.49-1.1.s390x", "openSUSE Tumbleweed:apache2-2.4.49-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2008-0005" }, { "cve": "CVE-2008-1678", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2008-1678" } ], "notes": [ { "category": "general", "text": "Memory leak in the zlib_stateful_init function in crypto/comp/c_zlib.c in libssl in OpenSSL 0.9.8f through 0.9.8h allows remote attackers to cause a denial of service (memory consumption) via multiple calls, as demonstrated by initial SSL client handshakes to the Apache HTTP Server mod_ssl that specify a compression algorithm.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:apache2-2.4.49-1.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.49-1.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.49-1.1.s390x", "openSUSE Tumbleweed:apache2-2.4.49-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2008-1678", "url": "https://www.suse.com/security/cve/CVE-2008-1678" }, { "category": "external", "summary": "SUSE Bug 392096 for CVE-2008-1678", "url": "https://bugzilla.suse.com/392096" }, { "category": "external", "summary": "SUSE Bug 422464 for CVE-2008-1678", "url": "https://bugzilla.suse.com/422464" }, { "category": "external", "summary": "SUSE Bug 566238 for CVE-2008-1678", "url": "https://bugzilla.suse.com/566238" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:apache2-2.4.49-1.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.49-1.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.49-1.1.s390x", "openSUSE Tumbleweed:apache2-2.4.49-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2008-1678" }, { "cve": "CVE-2008-2364", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2008-2364" } ], "notes": [ { "category": "general", "text": "The ap_proxy_http_process_response function in mod_proxy_http.c in the mod_proxy module in the Apache HTTP Server 2.0.63 and 2.2.8 does not limit the number of forwarded interim responses, which allows remote HTTP servers to cause a denial of service (memory consumption) via a large number of interim responses.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:apache2-2.4.49-1.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.49-1.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.49-1.1.s390x", "openSUSE Tumbleweed:apache2-2.4.49-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2008-2364", "url": "https://www.suse.com/security/cve/CVE-2008-2364" }, { "category": "external", "summary": "SUSE Bug 408832 for CVE-2008-2364", "url": "https://bugzilla.suse.com/408832" }, { "category": "external", "summary": "SUSE Bug 422464 for CVE-2008-2364", "url": "https://bugzilla.suse.com/422464" }, { "category": "external", "summary": "SUSE Bug 443824 for CVE-2008-2364", "url": "https://bugzilla.suse.com/443824" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:apache2-2.4.49-1.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.49-1.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.49-1.1.s390x", "openSUSE Tumbleweed:apache2-2.4.49-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2008-2364" }, { "cve": "CVE-2008-2939", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2008-2939" } ], "notes": [ { "category": "general", "text": "Cross-site scripting (XSS) vulnerability in proxy_ftp.c in the mod_proxy_ftp module in Apache 2.0.63 and earlier, and mod_proxy_ftp.c in the mod_proxy_ftp module in Apache 2.2.9 and earlier 2.2 versions, allows remote attackers to inject arbitrary web script or HTML via a wildcard in the last directory component in the pathname in an FTP URI.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:apache2-2.4.49-1.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.49-1.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.49-1.1.s390x", "openSUSE Tumbleweed:apache2-2.4.49-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2008-2939", "url": "https://www.suse.com/security/cve/CVE-2008-2939" }, { "category": "external", "summary": "SUSE Bug 210904 for CVE-2008-2939", "url": "https://bugzilla.suse.com/210904" }, { "category": "external", "summary": "SUSE Bug 415061 for CVE-2008-2939", "url": "https://bugzilla.suse.com/415061" }, { "category": "external", "summary": "SUSE Bug 422464 for CVE-2008-2939", "url": "https://bugzilla.suse.com/422464" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:apache2-2.4.49-1.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.49-1.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.49-1.1.s390x", "openSUSE Tumbleweed:apache2-2.4.49-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2008-2939" }, { "cve": "CVE-2016-5387", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5387" } ], "notes": [ { "category": "general", "text": "The Apache HTTP Server through 2.4.23 follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application\u0027s outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an \"httpoxy\" issue. NOTE: the vendor states \"This mitigation has been assigned the identifier CVE-2016-5387\"; in other words, this is not a CVE ID for a vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:apache2-2.4.49-1.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.49-1.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.49-1.1.s390x", "openSUSE Tumbleweed:apache2-2.4.49-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5387", "url": "https://www.suse.com/security/cve/CVE-2016-5387" }, { "category": "external", "summary": "SUSE Bug 988484 for CVE-2016-5387", "url": "https://bugzilla.suse.com/988484" }, { "category": "external", "summary": "SUSE Bug 988486 for CVE-2016-5387", "url": "https://bugzilla.suse.com/988486" }, { "category": "external", "summary": "SUSE Bug 988487 for CVE-2016-5387", "url": "https://bugzilla.suse.com/988487" }, { "category": "external", "summary": "SUSE Bug 988488 for CVE-2016-5387", "url": "https://bugzilla.suse.com/988488" }, { "category": "external", "summary": "SUSE Bug 988489 for CVE-2016-5387", "url": "https://bugzilla.suse.com/988489" }, { "category": "external", "summary": "SUSE Bug 988491 for CVE-2016-5387", "url": "https://bugzilla.suse.com/988491" }, { "category": "external", "summary": "SUSE Bug 988492 for CVE-2016-5387", "url": "https://bugzilla.suse.com/988492" }, { "category": "external", "summary": "SUSE Bug 989125 for CVE-2016-5387", "url": "https://bugzilla.suse.com/989125" }, { "category": "external", "summary": "SUSE Bug 989174 for CVE-2016-5387", "url": "https://bugzilla.suse.com/989174" }, { "category": "external", "summary": "SUSE Bug 989684 for CVE-2016-5387", "url": "https://bugzilla.suse.com/989684" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:apache2-2.4.49-1.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.49-1.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.49-1.1.s390x", "openSUSE Tumbleweed:apache2-2.4.49-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:apache2-2.4.49-1.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.49-1.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.49-1.1.s390x", "openSUSE Tumbleweed:apache2-2.4.49-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-5387" }, { "cve": "CVE-2016-8740", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8740" } ], "notes": [ { "category": "general", "text": "The mod_http2 module in the Apache HTTP Server 2.4.17 through 2.4.23, when the Protocols configuration includes h2 or h2c, does not restrict request-header length, which allows remote attackers to cause a denial of service (memory consumption) via crafted CONTINUATION frames in an HTTP/2 request.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:apache2-2.4.49-1.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.49-1.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.49-1.1.s390x", "openSUSE Tumbleweed:apache2-2.4.49-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8740", "url": "https://www.suse.com/security/cve/CVE-2016-8740" }, { "category": "external", "summary": "SUSE Bug 1013648 for CVE-2016-8740", "url": "https://bugzilla.suse.com/1013648" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:apache2-2.4.49-1.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.49-1.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.49-1.1.s390x", "openSUSE Tumbleweed:apache2-2.4.49-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:apache2-2.4.49-1.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.49-1.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.49-1.1.s390x", "openSUSE Tumbleweed:apache2-2.4.49-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-8740" }, { "cve": "CVE-2017-9798", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-9798" } ], "notes": [ { "category": "general", "text": "Apache httpd allows remote attackers to read secret data from process memory if the Limit directive can be set in a user\u0027s .htaccess file, or if httpd.conf has certain misconfigurations, aka Optionsbleed. This affects the Apache HTTP Server through 2.2.34 and 2.4.x through 2.4.27. The attacker sends an unauthenticated OPTIONS HTTP request when attempting to read secret data. This is a use-after-free issue and thus secret data is not always sent, and the specific data depends on many factors including configuration. Exploitation with .htaccess can be blocked with a patch to the ap_limit_section function in server/core.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:apache2-2.4.49-1.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.49-1.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.49-1.1.s390x", "openSUSE Tumbleweed:apache2-2.4.49-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-9798", "url": "https://www.suse.com/security/cve/CVE-2017-9798" }, { "category": "external", "summary": "SUSE Bug 1058058 for CVE-2017-9798", "url": "https://bugzilla.suse.com/1058058" }, { "category": "external", "summary": "SUSE Bug 1060757 for CVE-2017-9798", "url": "https://bugzilla.suse.com/1060757" }, { "category": "external", "summary": "SUSE Bug 1077582 for CVE-2017-9798", "url": "https://bugzilla.suse.com/1077582" }, { "category": "external", "summary": "SUSE Bug 1078450 for CVE-2017-9798", "url": "https://bugzilla.suse.com/1078450" }, { "category": "external", "summary": "SUSE Bug 1089997 for CVE-2017-9798", "url": "https://bugzilla.suse.com/1089997" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:apache2-2.4.49-1.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.49-1.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.49-1.1.s390x", "openSUSE Tumbleweed:apache2-2.4.49-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:apache2-2.4.49-1.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.49-1.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.49-1.1.s390x", "openSUSE Tumbleweed:apache2-2.4.49-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-9798" }, { "cve": "CVE-2019-10081", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-10081" } ], "notes": [ { "category": "general", "text": "HTTP/2 (2.4.20 through 2.4.39) very early pushes, for example configured with \"H2PushResource\", could lead to an overwrite of memory in the pushing request\u0027s pool, leading to crashes. The memory copied is that of the configured push link header values, not data supplied by the client.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:apache2-2.4.49-1.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.49-1.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.49-1.1.s390x", "openSUSE Tumbleweed:apache2-2.4.49-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-10081", "url": "https://www.suse.com/security/cve/CVE-2019-10081" }, { "category": "external", "summary": "SUSE Bug 1145742 for CVE-2019-10081", "url": "https://bugzilla.suse.com/1145742" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:apache2-2.4.49-1.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.49-1.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.49-1.1.s390x", "openSUSE Tumbleweed:apache2-2.4.49-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:apache2-2.4.49-1.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.49-1.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.49-1.1.s390x", "openSUSE Tumbleweed:apache2-2.4.49-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-10081" }, { "cve": "CVE-2019-10082", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-10082" } ], "notes": [ { "category": "general", "text": "In Apache HTTP Server 2.4.18-2.4.39, using fuzzed network input, the http/2 session handling could be made to read memory after being freed, during connection shutdown.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:apache2-2.4.49-1.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.49-1.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.49-1.1.s390x", "openSUSE Tumbleweed:apache2-2.4.49-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-10082", "url": "https://www.suse.com/security/cve/CVE-2019-10082" }, { "category": "external", "summary": "SUSE Bug 1145741 for CVE-2019-10082", "url": "https://bugzilla.suse.com/1145741" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:apache2-2.4.49-1.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.49-1.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.49-1.1.s390x", "openSUSE Tumbleweed:apache2-2.4.49-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:apache2-2.4.49-1.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.49-1.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.49-1.1.s390x", "openSUSE Tumbleweed:apache2-2.4.49-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-10082" }, { "cve": "CVE-2019-10092", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-10092" } ], "notes": [ { "category": "general", "text": "In Apache HTTP Server 2.4.0-2.4.39, a limited cross-site scripting issue was reported affecting the mod_proxy error page. An attacker could cause the link on the error page to be malformed and instead point to a page of their choice. This would only be exploitable where a server was set up with proxying enabled but was misconfigured in such a way that the Proxy Error page was displayed.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:apache2-2.4.49-1.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.49-1.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.49-1.1.s390x", "openSUSE Tumbleweed:apache2-2.4.49-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-10092", "url": "https://www.suse.com/security/cve/CVE-2019-10092" }, { "category": "external", "summary": "SUSE Bug 1145740 for CVE-2019-10092", "url": "https://bugzilla.suse.com/1145740" }, { "category": "external", "summary": "SUSE Bug 1182703 for CVE-2019-10092", "url": "https://bugzilla.suse.com/1182703" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:apache2-2.4.49-1.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.49-1.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.49-1.1.s390x", "openSUSE Tumbleweed:apache2-2.4.49-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:apache2-2.4.49-1.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.49-1.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.49-1.1.s390x", "openSUSE Tumbleweed:apache2-2.4.49-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-10092" }, { "cve": "CVE-2019-10097", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-10097" } ], "notes": [ { "category": "general", "text": "In Apache HTTP Server 2.4.32-2.4.39, when mod_remoteip was configured to use a trusted intermediary proxy server using the \"PROXY\" protocol, a specially crafted PROXY header could trigger a stack buffer overflow or NULL pointer deference. This vulnerability could only be triggered by a trusted proxy and not by untrusted HTTP clients.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:apache2-2.4.49-1.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.49-1.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.49-1.1.s390x", "openSUSE Tumbleweed:apache2-2.4.49-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-10097", "url": "https://www.suse.com/security/cve/CVE-2019-10097" }, { "category": "external", "summary": "SUSE Bug 1145739 for CVE-2019-10097", "url": "https://bugzilla.suse.com/1145739" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:apache2-2.4.49-1.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.49-1.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.49-1.1.s390x", "openSUSE Tumbleweed:apache2-2.4.49-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:apache2-2.4.49-1.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.49-1.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.49-1.1.s390x", "openSUSE Tumbleweed:apache2-2.4.49-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-10097" }, { "cve": "CVE-2019-10098", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-10098" } ], "notes": [ { "category": "general", "text": "In Apache HTTP server 2.4.0 to 2.4.39, Redirects configured with mod_rewrite that were intended to be self-referential might be fooled by encoded newlines and redirect instead to an unexpected URL within the request URL.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:apache2-2.4.49-1.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.49-1.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.49-1.1.s390x", "openSUSE Tumbleweed:apache2-2.4.49-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-10098", "url": "https://www.suse.com/security/cve/CVE-2019-10098" }, { "category": "external", "summary": "SUSE Bug 1145738 for CVE-2019-10098", "url": "https://bugzilla.suse.com/1145738" }, { "category": "external", "summary": "SUSE Bug 1168407 for CVE-2019-10098", "url": "https://bugzilla.suse.com/1168407" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:apache2-2.4.49-1.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.49-1.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.49-1.1.s390x", "openSUSE Tumbleweed:apache2-2.4.49-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:apache2-2.4.49-1.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.49-1.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.49-1.1.s390x", "openSUSE Tumbleweed:apache2-2.4.49-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-10098" }, { "cve": "CVE-2019-9517", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9517" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to unconstrained interal data buffering, potentially leading to a denial of service. The attacker opens the HTTP/2 window so the peer can send without constraint; however, they leave the TCP window closed so the peer cannot actually write (many of) the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the servers queue the responses, this can consume excess memory, CPU, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:apache2-2.4.49-1.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.49-1.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.49-1.1.s390x", "openSUSE Tumbleweed:apache2-2.4.49-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9517", "url": "https://www.suse.com/security/cve/CVE-2019-9517" }, { "category": "external", "summary": "SUSE Bug 1145575 for CVE-2019-9517", "url": "https://bugzilla.suse.com/1145575" }, { "category": "external", "summary": "SUSE Bug 1146097 for CVE-2019-9517", "url": "https://bugzilla.suse.com/1146097" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:apache2-2.4.49-1.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.49-1.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.49-1.1.s390x", "openSUSE Tumbleweed:apache2-2.4.49-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:apache2-2.4.49-1.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.49-1.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.49-1.1.s390x", "openSUSE Tumbleweed:apache2-2.4.49-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-9517" } ] }
opensuse-su-2019:2115-1
Vulnerability from csaf_opensuse
Published
2019-09-10 16:22
Modified
2019-09-10 16:22
Summary
Security update for nodejs8
Notes
Title of the patch
Security update for nodejs8
Description of the patch
This update for nodejs8 to version 8.16.1 fixes the following issues:
Security issues fixed:
- CVE-2019-9511: Fixed HTTP/2 implementations that are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service (bsc#1146091).
- CVE-2019-9512: Fixed HTTP/2 flood using PING frames results in unbounded memory growth (bsc#1146099).
- CVE-2019-9513: Fixed HTTP/2 implementation that is vulnerable to resource loops, potentially leading to a denial of service. (bsc#1146094).
- CVE-2019-9514: Fixed HTTP/2 implementation that is vulnerable to a reset flood, potentially leading to a denial of service (bsc#1146095).
- CVE-2019-9515: Fixed HTTP/2 flood using SETTINGS frames results in unbounded memory growth (bsc#1146100).
- CVE-2019-9516: Fixed HTTP/2 implementation that is vulnerable to a header leak, potentially leading to a denial of service (bsc#1146090).
- CVE-2019-9517: Fixed HTTP/2 implementations that are vulnerable to unconstrained interal data buffering (bsc#1146097).
- CVE-2019-9518: Fixed HTTP/2 implementation that is vulnerable to a flood of empty frames, potentially leading to a denial of service (bsc#1146093).
Bug fixes:
- Fixed that npm resolves its default config file like in all other versions, as /etc/nodejs/npmrc (bsc#1144919).
This update was imported from the SUSE:SLE-15:Update update project.
Patchnames
openSUSE-2019-2115
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for nodejs8", "title": "Title of the patch" }, { "category": "description", "text": "This update for nodejs8 to version 8.16.1 fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2019-9511: Fixed HTTP/2 implementations that are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service (bsc#1146091).\n- CVE-2019-9512: Fixed HTTP/2 flood using PING frames results in unbounded memory growth (bsc#1146099).\n- CVE-2019-9513: Fixed HTTP/2 implementation that is vulnerable to resource loops, potentially leading to a denial of service. (bsc#1146094).\n- CVE-2019-9514: Fixed HTTP/2 implementation that is vulnerable to a reset flood, potentially leading to a denial of service (bsc#1146095).\n- CVE-2019-9515: Fixed HTTP/2 flood using SETTINGS frames results in unbounded memory growth (bsc#1146100).\n- CVE-2019-9516: Fixed HTTP/2 implementation that is vulnerable to a header leak, potentially leading to a denial of service (bsc#1146090).\n- CVE-2019-9517: Fixed HTTP/2 implementations that are vulnerable to unconstrained interal data buffering (bsc#1146097).\n- CVE-2019-9518: Fixed HTTP/2 implementation that is vulnerable to a flood of empty frames, potentially leading to a denial of service (bsc#1146093).\n\nBug fixes:\n\n- Fixed that npm resolves its default config file like in all other versions, as /etc/nodejs/npmrc (bsc#1144919).\n\nThis update was imported from the SUSE:SLE-15:Update update project.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2019-2115", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_2115-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2019:2115-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TLFKC75QWUPCRCPS6I4CH5LO7W5G2JQK/#TLFKC75QWUPCRCPS6I4CH5LO7W5G2JQK" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2019:2115-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TLFKC75QWUPCRCPS6I4CH5LO7W5G2JQK/#TLFKC75QWUPCRCPS6I4CH5LO7W5G2JQK" }, { "category": "self", "summary": "SUSE Bug 1144919", "url": "https://bugzilla.suse.com/1144919" }, { "category": "self", "summary": "SUSE Bug 1146090", "url": "https://bugzilla.suse.com/1146090" }, { "category": "self", "summary": "SUSE Bug 1146091", "url": "https://bugzilla.suse.com/1146091" }, { "category": "self", "summary": "SUSE Bug 1146093", "url": "https://bugzilla.suse.com/1146093" }, { "category": "self", "summary": "SUSE Bug 1146094", "url": "https://bugzilla.suse.com/1146094" }, { "category": "self", "summary": "SUSE Bug 1146095", "url": "https://bugzilla.suse.com/1146095" }, { "category": "self", "summary": "SUSE Bug 1146097", "url": "https://bugzilla.suse.com/1146097" }, { "category": "self", "summary": "SUSE Bug 1146099", "url": "https://bugzilla.suse.com/1146099" }, { "category": "self", "summary": "SUSE Bug 1146100", "url": "https://bugzilla.suse.com/1146100" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9511 page", "url": "https://www.suse.com/security/cve/CVE-2019-9511/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9512 page", "url": "https://www.suse.com/security/cve/CVE-2019-9512/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9513 page", "url": "https://www.suse.com/security/cve/CVE-2019-9513/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9514 page", "url": "https://www.suse.com/security/cve/CVE-2019-9514/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9515 page", "url": "https://www.suse.com/security/cve/CVE-2019-9515/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9516 page", "url": "https://www.suse.com/security/cve/CVE-2019-9516/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9517 page", "url": "https://www.suse.com/security/cve/CVE-2019-9517/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9518 page", "url": "https://www.suse.com/security/cve/CVE-2019-9518/" } ], "title": "Security update for nodejs8", "tracking": { "current_release_date": "2019-09-10T16:22:52Z", "generator": { "date": "2019-09-10T16:22:52Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2019:2115-1", "initial_release_date": "2019-09-10T16:22:52Z", "revision_history": [ { "date": "2019-09-10T16:22:52Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "nodejs8-8.16.1-lp151.2.6.1.i586", "product": { "name": "nodejs8-8.16.1-lp151.2.6.1.i586", "product_id": "nodejs8-8.16.1-lp151.2.6.1.i586" } }, { "category": "product_version", "name": "nodejs8-devel-8.16.1-lp151.2.6.1.i586", "product": { "name": "nodejs8-devel-8.16.1-lp151.2.6.1.i586", "product_id": "nodejs8-devel-8.16.1-lp151.2.6.1.i586" } }, { "category": "product_version", "name": "npm8-8.16.1-lp151.2.6.1.i586", "product": { "name": "npm8-8.16.1-lp151.2.6.1.i586", "product_id": "npm8-8.16.1-lp151.2.6.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "product": { "name": "nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "product_id": "nodejs8-docs-8.16.1-lp151.2.6.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "nodejs8-8.16.1-lp151.2.6.1.x86_64", "product": { "name": "nodejs8-8.16.1-lp151.2.6.1.x86_64", "product_id": "nodejs8-8.16.1-lp151.2.6.1.x86_64" } }, { "category": "product_version", "name": "nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "product": { "name": "nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "product_id": "nodejs8-devel-8.16.1-lp151.2.6.1.x86_64" } }, { "category": "product_version", "name": "npm8-8.16.1-lp151.2.6.1.x86_64", "product": { "name": "npm8-8.16.1-lp151.2.6.1.x86_64", "product_id": "npm8-8.16.1-lp151.2.6.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Leap 15.0", "product": { "name": "openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.0" } } }, { "category": "product_name", "name": "openSUSE Leap 15.1", "product": { "name": "openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "nodejs8-8.16.1-lp151.2.6.1.i586 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.i586" }, "product_reference": "nodejs8-8.16.1-lp151.2.6.1.i586", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-8.16.1-lp151.2.6.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.x86_64" }, "product_reference": "nodejs8-8.16.1-lp151.2.6.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-devel-8.16.1-lp151.2.6.1.i586 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.i586" }, "product_reference": "nodejs8-devel-8.16.1-lp151.2.6.1.i586", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-devel-8.16.1-lp151.2.6.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64" }, "product_reference": "nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-docs-8.16.1-lp151.2.6.1.noarch as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:nodejs8-docs-8.16.1-lp151.2.6.1.noarch" }, "product_reference": "nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "npm8-8.16.1-lp151.2.6.1.i586 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.i586" }, "product_reference": "npm8-8.16.1-lp151.2.6.1.i586", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "npm8-8.16.1-lp151.2.6.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.x86_64" }, "product_reference": "npm8-8.16.1-lp151.2.6.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-8.16.1-lp151.2.6.1.i586 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.i586" }, "product_reference": "nodejs8-8.16.1-lp151.2.6.1.i586", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-8.16.1-lp151.2.6.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.x86_64" }, "product_reference": "nodejs8-8.16.1-lp151.2.6.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-devel-8.16.1-lp151.2.6.1.i586 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.i586" }, "product_reference": "nodejs8-devel-8.16.1-lp151.2.6.1.i586", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-devel-8.16.1-lp151.2.6.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64" }, "product_reference": "nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-docs-8.16.1-lp151.2.6.1.noarch as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:nodejs8-docs-8.16.1-lp151.2.6.1.noarch" }, "product_reference": "nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "npm8-8.16.1-lp151.2.6.1.i586 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.i586" }, "product_reference": "npm8-8.16.1-lp151.2.6.1.i586", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "npm8-8.16.1-lp151.2.6.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.x86_64" }, "product_reference": "npm8-8.16.1-lp151.2.6.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-9511", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9511" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9511", "url": "https://www.suse.com/security/cve/CVE-2019-9511" }, { "category": "external", "summary": "SUSE Bug 1145579 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1145579" }, { "category": "external", "summary": "SUSE Bug 1146091 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1146091" }, { "category": "external", "summary": "SUSE Bug 1146182 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1146182" }, { "category": "external", "summary": "SUSE Bug 1193427 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1193427" }, { "category": "external", "summary": "SUSE Bug 1202787 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1202787" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-10T16:22:52Z", "details": "low" } ], "title": "CVE-2019-9511" }, { "cve": "CVE-2019-9512", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9512" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9512", "url": "https://www.suse.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146099 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1146099" }, { "category": "external", "summary": "SUSE Bug 1146111 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1146111" }, { "category": "external", "summary": "SUSE Bug 1147142 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1147142" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-10T16:22:52Z", "details": "important" } ], "title": "CVE-2019-9512" }, { "cve": "CVE-2019-9513", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9513" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9513", "url": "https://www.suse.com/security/cve/CVE-2019-9513" }, { "category": "external", "summary": "SUSE Bug 1145580 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1145580" }, { "category": "external", "summary": "SUSE Bug 1146094 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1146094" }, { "category": "external", "summary": "SUSE Bug 1146184 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1146184" }, { "category": "external", "summary": "SUSE Bug 1193427 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1193427" }, { "category": "external", "summary": "SUSE Bug 1202787 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1202787" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-10T16:22:52Z", "details": "low" } ], "title": "CVE-2019-9513" }, { "cve": "CVE-2019-9514", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9514" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9514", "url": "https://www.suse.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "SUSE Bug 1145662 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1145662" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146095 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1146095" }, { "category": "external", "summary": "SUSE Bug 1146115 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1146115" }, { "category": "external", "summary": "SUSE Bug 1147142 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1147142" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-10T16:22:52Z", "details": "important" } ], "title": "CVE-2019-9514" }, { "cve": "CVE-2019-9515", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9515" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to a settings flood, potentially leading to a denial of service. The attacker sends a stream of SETTINGS frames to the peer. Since the RFC requires that the peer reply with one acknowledgement per SETTINGS frame, an empty SETTINGS frame is almost equivalent in behavior to a ping. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9515", "url": "https://www.suse.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9515", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146100 for CVE-2019-9515", "url": "https://bugzilla.suse.com/1146100" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-10T16:22:52Z", "details": "important" } ], "title": "CVE-2019-9515" }, { "cve": "CVE-2019-9516", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9516" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service. The attacker sends a stream of headers with a 0-length header name and 0-length header value, optionally Huffman encoded into 1-byte or greater headers. Some implementations allocate memory for these headers and keep the allocation alive until the session dies. This can consume excess memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9516", "url": "https://www.suse.com/security/cve/CVE-2019-9516" }, { "category": "external", "summary": "SUSE Bug 1145582 for CVE-2019-9516", "url": "https://bugzilla.suse.com/1145582" }, { "category": "external", "summary": "SUSE Bug 1146090 for CVE-2019-9516", "url": "https://bugzilla.suse.com/1146090" }, { "category": "external", "summary": "SUSE Bug 1193427 for CVE-2019-9516", "url": "https://bugzilla.suse.com/1193427" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-10T16:22:52Z", "details": "low" } ], "title": "CVE-2019-9516" }, { "cve": "CVE-2019-9517", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9517" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to unconstrained interal data buffering, potentially leading to a denial of service. The attacker opens the HTTP/2 window so the peer can send without constraint; however, they leave the TCP window closed so the peer cannot actually write (many of) the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the servers queue the responses, this can consume excess memory, CPU, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9517", "url": "https://www.suse.com/security/cve/CVE-2019-9517" }, { "category": "external", "summary": "SUSE Bug 1145575 for CVE-2019-9517", "url": "https://bugzilla.suse.com/1145575" }, { "category": "external", "summary": "SUSE Bug 1146097 for CVE-2019-9517", "url": "https://bugzilla.suse.com/1146097" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-10T16:22:52Z", "details": "moderate" } ], "title": "CVE-2019-9517" }, { "cve": "CVE-2019-9518", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9518" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leading to a denial of service. The attacker sends a stream of frames with an empty payload and without the end-of-stream flag. These frames can be DATA, HEADERS, CONTINUATION and/or PUSH_PROMISE. The peer spends time processing each frame disproportionate to attack bandwidth. This can consume excess CPU.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9518", "url": "https://www.suse.com/security/cve/CVE-2019-9518" }, { "category": "external", "summary": "SUSE Bug 1145662 for CVE-2019-9518", "url": "https://bugzilla.suse.com/1145662" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9518", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146093 for CVE-2019-9518", "url": "https://bugzilla.suse.com/1146093" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-10T16:22:52Z", "details": "important" } ], "title": "CVE-2019-9518" } ] }
opensuse-su-2019:2051-1
Vulnerability from csaf_opensuse
Published
2019-09-02 10:33
Modified
2019-09-02 10:33
Summary
Security update for apache2
Notes
Title of the patch
Security update for apache2
Description of the patch
This update for apache2 fixes the following issues:
Security issues fixed:
- CVE-2019-9517: Fixed HTTP/2 implementations that are vulnerable to unconstrained interal data buffering (bsc#1145575).
- CVE-2019-10081: Fixed mod_http2 that is vulnerable to memory corruption on early pushes (bsc#1145742).
- CVE-2019-10082: Fixed mod_http2 that is vulnerable to read-after-free in h2 connection shutdown (bsc#1145741).
- CVE-2019-10092: Fixed limited cross-site scripting in mod_proxy (bsc#1145740).
- CVE-2019-10097: Fixed mod_remoteip stack buffer overflow and NULL pointer dereference (bsc#1145739).
- CVE-2019-10098: Fixed mod_rewrite configuration vulnerablility to open redirect (bsc#1145738).
This update was imported from the SUSE:SLE-15:Update update project.
Patchnames
openSUSE-2019-2051
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for apache2", "title": "Title of the patch" }, { "category": "description", "text": "This update for apache2 fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2019-9517: Fixed HTTP/2 implementations that are vulnerable to unconstrained interal data buffering (bsc#1145575).\n- CVE-2019-10081: Fixed mod_http2 that is vulnerable to memory corruption on early pushes (bsc#1145742).\n- CVE-2019-10082: Fixed mod_http2 that is vulnerable to read-after-free in h2 connection shutdown (bsc#1145741).\n- CVE-2019-10092: Fixed limited cross-site scripting in mod_proxy (bsc#1145740).\n- CVE-2019-10097: Fixed mod_remoteip stack buffer overflow and NULL pointer dereference (bsc#1145739).\n- CVE-2019-10098: Fixed mod_rewrite configuration vulnerablility to open redirect (bsc#1145738).\n\nThis update was imported from the SUSE:SLE-15:Update update project.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2019-2051", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_2051-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2019:2051-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2PR3ITGMIPGWWX4VYKKICQKSZVW5QUW3/#2PR3ITGMIPGWWX4VYKKICQKSZVW5QUW3" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2019:2051-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2PR3ITGMIPGWWX4VYKKICQKSZVW5QUW3/#2PR3ITGMIPGWWX4VYKKICQKSZVW5QUW3" }, { "category": "self", "summary": "SUSE Bug 1145575", "url": "https://bugzilla.suse.com/1145575" }, { "category": "self", "summary": "SUSE Bug 1145738", "url": "https://bugzilla.suse.com/1145738" }, { "category": "self", "summary": "SUSE Bug 1145739", "url": "https://bugzilla.suse.com/1145739" }, { "category": "self", "summary": "SUSE Bug 1145740", "url": "https://bugzilla.suse.com/1145740" }, { "category": "self", "summary": "SUSE Bug 1145741", "url": "https://bugzilla.suse.com/1145741" }, { "category": "self", "summary": "SUSE Bug 1145742", "url": "https://bugzilla.suse.com/1145742" }, { "category": "self", "summary": "SUSE CVE CVE-2019-10081 page", "url": "https://www.suse.com/security/cve/CVE-2019-10081/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-10082 page", "url": "https://www.suse.com/security/cve/CVE-2019-10082/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-10092 page", "url": "https://www.suse.com/security/cve/CVE-2019-10092/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-10097 page", "url": "https://www.suse.com/security/cve/CVE-2019-10097/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-10098 page", "url": "https://www.suse.com/security/cve/CVE-2019-10098/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9517 page", "url": "https://www.suse.com/security/cve/CVE-2019-9517/" } ], "title": "Security update for apache2", "tracking": { "current_release_date": "2019-09-02T10:33:13Z", "generator": { "date": "2019-09-02T10:33:13Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2019:2051-1", "initial_release_date": "2019-09-02T10:33:13Z", "revision_history": [ { "date": "2019-09-02T10:33:13Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "apache2-2.4.33-lp151.8.6.1.i586", "product": { "name": "apache2-2.4.33-lp151.8.6.1.i586", "product_id": "apache2-2.4.33-lp151.8.6.1.i586" } }, { "category": "product_version", "name": "apache2-devel-2.4.33-lp151.8.6.1.i586", "product": { "name": "apache2-devel-2.4.33-lp151.8.6.1.i586", "product_id": "apache2-devel-2.4.33-lp151.8.6.1.i586" } }, { "category": "product_version", "name": "apache2-event-2.4.33-lp151.8.6.1.i586", "product": { "name": "apache2-event-2.4.33-lp151.8.6.1.i586", "product_id": "apache2-event-2.4.33-lp151.8.6.1.i586" } }, { "category": "product_version", "name": "apache2-example-pages-2.4.33-lp151.8.6.1.i586", "product": { "name": "apache2-example-pages-2.4.33-lp151.8.6.1.i586", "product_id": "apache2-example-pages-2.4.33-lp151.8.6.1.i586" } }, { "category": "product_version", "name": "apache2-prefork-2.4.33-lp151.8.6.1.i586", "product": { "name": "apache2-prefork-2.4.33-lp151.8.6.1.i586", "product_id": "apache2-prefork-2.4.33-lp151.8.6.1.i586" } }, { "category": "product_version", "name": "apache2-utils-2.4.33-lp151.8.6.1.i586", "product": { "name": "apache2-utils-2.4.33-lp151.8.6.1.i586", "product_id": "apache2-utils-2.4.33-lp151.8.6.1.i586" } }, { "category": "product_version", "name": "apache2-worker-2.4.33-lp151.8.6.1.i586", "product": { "name": "apache2-worker-2.4.33-lp151.8.6.1.i586", "product_id": "apache2-worker-2.4.33-lp151.8.6.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "apache2-doc-2.4.33-lp151.8.6.1.noarch", "product": { "name": "apache2-doc-2.4.33-lp151.8.6.1.noarch", "product_id": "apache2-doc-2.4.33-lp151.8.6.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "apache2-2.4.33-lp151.8.6.1.x86_64", "product": { "name": "apache2-2.4.33-lp151.8.6.1.x86_64", "product_id": "apache2-2.4.33-lp151.8.6.1.x86_64" } }, { "category": "product_version", "name": "apache2-devel-2.4.33-lp151.8.6.1.x86_64", "product": { "name": "apache2-devel-2.4.33-lp151.8.6.1.x86_64", "product_id": "apache2-devel-2.4.33-lp151.8.6.1.x86_64" } }, { "category": "product_version", "name": "apache2-event-2.4.33-lp151.8.6.1.x86_64", "product": { "name": "apache2-event-2.4.33-lp151.8.6.1.x86_64", "product_id": "apache2-event-2.4.33-lp151.8.6.1.x86_64" } }, { "category": "product_version", "name": "apache2-example-pages-2.4.33-lp151.8.6.1.x86_64", "product": { "name": "apache2-example-pages-2.4.33-lp151.8.6.1.x86_64", "product_id": "apache2-example-pages-2.4.33-lp151.8.6.1.x86_64" } }, { "category": "product_version", "name": "apache2-prefork-2.4.33-lp151.8.6.1.x86_64", "product": { "name": "apache2-prefork-2.4.33-lp151.8.6.1.x86_64", "product_id": "apache2-prefork-2.4.33-lp151.8.6.1.x86_64" } }, { "category": "product_version", "name": "apache2-utils-2.4.33-lp151.8.6.1.x86_64", "product": { "name": "apache2-utils-2.4.33-lp151.8.6.1.x86_64", "product_id": "apache2-utils-2.4.33-lp151.8.6.1.x86_64" } }, { "category": "product_version", "name": "apache2-worker-2.4.33-lp151.8.6.1.x86_64", "product": { "name": "apache2-worker-2.4.33-lp151.8.6.1.x86_64", "product_id": "apache2-worker-2.4.33-lp151.8.6.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Leap 15.0", "product": { "name": "openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.0" } } }, { "category": "product_name", "name": "openSUSE Leap 15.1", "product": { "name": "openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "apache2-2.4.33-lp151.8.6.1.i586 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:apache2-2.4.33-lp151.8.6.1.i586" }, "product_reference": "apache2-2.4.33-lp151.8.6.1.i586", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-2.4.33-lp151.8.6.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:apache2-2.4.33-lp151.8.6.1.x86_64" }, "product_reference": "apache2-2.4.33-lp151.8.6.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-devel-2.4.33-lp151.8.6.1.i586 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:apache2-devel-2.4.33-lp151.8.6.1.i586" }, "product_reference": "apache2-devel-2.4.33-lp151.8.6.1.i586", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-devel-2.4.33-lp151.8.6.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:apache2-devel-2.4.33-lp151.8.6.1.x86_64" }, "product_reference": "apache2-devel-2.4.33-lp151.8.6.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-doc-2.4.33-lp151.8.6.1.noarch as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:apache2-doc-2.4.33-lp151.8.6.1.noarch" }, "product_reference": "apache2-doc-2.4.33-lp151.8.6.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-event-2.4.33-lp151.8.6.1.i586 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:apache2-event-2.4.33-lp151.8.6.1.i586" }, "product_reference": "apache2-event-2.4.33-lp151.8.6.1.i586", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-event-2.4.33-lp151.8.6.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:apache2-event-2.4.33-lp151.8.6.1.x86_64" }, "product_reference": "apache2-event-2.4.33-lp151.8.6.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-example-pages-2.4.33-lp151.8.6.1.i586 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp151.8.6.1.i586" }, "product_reference": "apache2-example-pages-2.4.33-lp151.8.6.1.i586", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-example-pages-2.4.33-lp151.8.6.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp151.8.6.1.x86_64" }, "product_reference": "apache2-example-pages-2.4.33-lp151.8.6.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-prefork-2.4.33-lp151.8.6.1.i586 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp151.8.6.1.i586" }, "product_reference": "apache2-prefork-2.4.33-lp151.8.6.1.i586", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-prefork-2.4.33-lp151.8.6.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp151.8.6.1.x86_64" }, "product_reference": "apache2-prefork-2.4.33-lp151.8.6.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-utils-2.4.33-lp151.8.6.1.i586 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:apache2-utils-2.4.33-lp151.8.6.1.i586" }, "product_reference": "apache2-utils-2.4.33-lp151.8.6.1.i586", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-utils-2.4.33-lp151.8.6.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:apache2-utils-2.4.33-lp151.8.6.1.x86_64" }, "product_reference": "apache2-utils-2.4.33-lp151.8.6.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-worker-2.4.33-lp151.8.6.1.i586 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:apache2-worker-2.4.33-lp151.8.6.1.i586" }, "product_reference": "apache2-worker-2.4.33-lp151.8.6.1.i586", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-worker-2.4.33-lp151.8.6.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:apache2-worker-2.4.33-lp151.8.6.1.x86_64" }, "product_reference": "apache2-worker-2.4.33-lp151.8.6.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-2.4.33-lp151.8.6.1.i586 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:apache2-2.4.33-lp151.8.6.1.i586" }, "product_reference": "apache2-2.4.33-lp151.8.6.1.i586", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-2.4.33-lp151.8.6.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:apache2-2.4.33-lp151.8.6.1.x86_64" }, "product_reference": "apache2-2.4.33-lp151.8.6.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-devel-2.4.33-lp151.8.6.1.i586 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:apache2-devel-2.4.33-lp151.8.6.1.i586" }, "product_reference": "apache2-devel-2.4.33-lp151.8.6.1.i586", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-devel-2.4.33-lp151.8.6.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:apache2-devel-2.4.33-lp151.8.6.1.x86_64" }, "product_reference": "apache2-devel-2.4.33-lp151.8.6.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-doc-2.4.33-lp151.8.6.1.noarch as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:apache2-doc-2.4.33-lp151.8.6.1.noarch" }, "product_reference": "apache2-doc-2.4.33-lp151.8.6.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-event-2.4.33-lp151.8.6.1.i586 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:apache2-event-2.4.33-lp151.8.6.1.i586" }, "product_reference": "apache2-event-2.4.33-lp151.8.6.1.i586", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-event-2.4.33-lp151.8.6.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:apache2-event-2.4.33-lp151.8.6.1.x86_64" }, "product_reference": "apache2-event-2.4.33-lp151.8.6.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-example-pages-2.4.33-lp151.8.6.1.i586 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:apache2-example-pages-2.4.33-lp151.8.6.1.i586" }, "product_reference": "apache2-example-pages-2.4.33-lp151.8.6.1.i586", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-example-pages-2.4.33-lp151.8.6.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:apache2-example-pages-2.4.33-lp151.8.6.1.x86_64" }, "product_reference": "apache2-example-pages-2.4.33-lp151.8.6.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-prefork-2.4.33-lp151.8.6.1.i586 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:apache2-prefork-2.4.33-lp151.8.6.1.i586" }, "product_reference": "apache2-prefork-2.4.33-lp151.8.6.1.i586", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-prefork-2.4.33-lp151.8.6.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:apache2-prefork-2.4.33-lp151.8.6.1.x86_64" }, "product_reference": "apache2-prefork-2.4.33-lp151.8.6.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-utils-2.4.33-lp151.8.6.1.i586 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:apache2-utils-2.4.33-lp151.8.6.1.i586" }, "product_reference": "apache2-utils-2.4.33-lp151.8.6.1.i586", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-utils-2.4.33-lp151.8.6.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:apache2-utils-2.4.33-lp151.8.6.1.x86_64" }, "product_reference": "apache2-utils-2.4.33-lp151.8.6.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-worker-2.4.33-lp151.8.6.1.i586 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:apache2-worker-2.4.33-lp151.8.6.1.i586" }, "product_reference": "apache2-worker-2.4.33-lp151.8.6.1.i586", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "apache2-worker-2.4.33-lp151.8.6.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:apache2-worker-2.4.33-lp151.8.6.1.x86_64" }, "product_reference": "apache2-worker-2.4.33-lp151.8.6.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-10081", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-10081" } ], "notes": [ { "category": "general", "text": "HTTP/2 (2.4.20 through 2.4.39) very early pushes, for example configured with \"H2PushResource\", could lead to an overwrite of memory in the pushing request\u0027s pool, leading to crashes. The memory copied is that of the configured push link header values, not data supplied by the client.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:apache2-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-doc-2.4.33-lp151.8.6.1.noarch", "openSUSE Leap 15.0:apache2-event-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-event-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-devel-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-devel-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-doc-2.4.33-lp151.8.6.1.noarch", "openSUSE Leap 15.1:apache2-event-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-event-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-example-pages-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-example-pages-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-prefork-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-prefork-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-utils-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-utils-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-worker-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-worker-2.4.33-lp151.8.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-10081", "url": "https://www.suse.com/security/cve/CVE-2019-10081" }, { "category": "external", "summary": "SUSE Bug 1145742 for CVE-2019-10081", "url": "https://bugzilla.suse.com/1145742" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:apache2-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-doc-2.4.33-lp151.8.6.1.noarch", "openSUSE Leap 15.0:apache2-event-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-event-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-devel-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-devel-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-doc-2.4.33-lp151.8.6.1.noarch", "openSUSE Leap 15.1:apache2-event-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-event-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-example-pages-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-example-pages-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-prefork-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-prefork-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-utils-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-utils-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-worker-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-worker-2.4.33-lp151.8.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Leap 15.0:apache2-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-doc-2.4.33-lp151.8.6.1.noarch", "openSUSE Leap 15.0:apache2-event-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-event-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-devel-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-devel-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-doc-2.4.33-lp151.8.6.1.noarch", "openSUSE Leap 15.1:apache2-event-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-event-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-example-pages-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-example-pages-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-prefork-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-prefork-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-utils-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-utils-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-worker-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-worker-2.4.33-lp151.8.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-02T10:33:13Z", "details": "moderate" } ], "title": "CVE-2019-10081" }, { "cve": "CVE-2019-10082", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-10082" } ], "notes": [ { "category": "general", "text": "In Apache HTTP Server 2.4.18-2.4.39, using fuzzed network input, the http/2 session handling could be made to read memory after being freed, during connection shutdown.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:apache2-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-doc-2.4.33-lp151.8.6.1.noarch", "openSUSE Leap 15.0:apache2-event-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-event-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-devel-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-devel-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-doc-2.4.33-lp151.8.6.1.noarch", "openSUSE Leap 15.1:apache2-event-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-event-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-example-pages-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-example-pages-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-prefork-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-prefork-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-utils-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-utils-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-worker-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-worker-2.4.33-lp151.8.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-10082", "url": "https://www.suse.com/security/cve/CVE-2019-10082" }, { "category": "external", "summary": "SUSE Bug 1145741 for CVE-2019-10082", "url": "https://bugzilla.suse.com/1145741" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:apache2-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-doc-2.4.33-lp151.8.6.1.noarch", "openSUSE Leap 15.0:apache2-event-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-event-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-devel-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-devel-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-doc-2.4.33-lp151.8.6.1.noarch", "openSUSE Leap 15.1:apache2-event-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-event-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-example-pages-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-example-pages-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-prefork-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-prefork-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-utils-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-utils-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-worker-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-worker-2.4.33-lp151.8.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Leap 15.0:apache2-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-doc-2.4.33-lp151.8.6.1.noarch", "openSUSE Leap 15.0:apache2-event-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-event-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-devel-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-devel-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-doc-2.4.33-lp151.8.6.1.noarch", "openSUSE Leap 15.1:apache2-event-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-event-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-example-pages-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-example-pages-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-prefork-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-prefork-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-utils-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-utils-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-worker-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-worker-2.4.33-lp151.8.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-02T10:33:13Z", "details": "moderate" } ], "title": "CVE-2019-10082" }, { "cve": "CVE-2019-10092", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-10092" } ], "notes": [ { "category": "general", "text": "In Apache HTTP Server 2.4.0-2.4.39, a limited cross-site scripting issue was reported affecting the mod_proxy error page. An attacker could cause the link on the error page to be malformed and instead point to a page of their choice. This would only be exploitable where a server was set up with proxying enabled but was misconfigured in such a way that the Proxy Error page was displayed.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:apache2-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-doc-2.4.33-lp151.8.6.1.noarch", "openSUSE Leap 15.0:apache2-event-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-event-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-devel-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-devel-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-doc-2.4.33-lp151.8.6.1.noarch", "openSUSE Leap 15.1:apache2-event-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-event-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-example-pages-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-example-pages-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-prefork-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-prefork-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-utils-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-utils-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-worker-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-worker-2.4.33-lp151.8.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-10092", "url": "https://www.suse.com/security/cve/CVE-2019-10092" }, { "category": "external", "summary": "SUSE Bug 1145740 for CVE-2019-10092", "url": "https://bugzilla.suse.com/1145740" }, { "category": "external", "summary": "SUSE Bug 1182703 for CVE-2019-10092", "url": "https://bugzilla.suse.com/1182703" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:apache2-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-doc-2.4.33-lp151.8.6.1.noarch", "openSUSE Leap 15.0:apache2-event-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-event-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-devel-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-devel-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-doc-2.4.33-lp151.8.6.1.noarch", "openSUSE Leap 15.1:apache2-event-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-event-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-example-pages-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-example-pages-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-prefork-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-prefork-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-utils-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-utils-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-worker-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-worker-2.4.33-lp151.8.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Leap 15.0:apache2-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-doc-2.4.33-lp151.8.6.1.noarch", "openSUSE Leap 15.0:apache2-event-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-event-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-devel-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-devel-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-doc-2.4.33-lp151.8.6.1.noarch", "openSUSE Leap 15.1:apache2-event-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-event-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-example-pages-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-example-pages-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-prefork-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-prefork-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-utils-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-utils-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-worker-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-worker-2.4.33-lp151.8.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-02T10:33:13Z", "details": "important" } ], "title": "CVE-2019-10092" }, { "cve": "CVE-2019-10097", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-10097" } ], "notes": [ { "category": "general", "text": "In Apache HTTP Server 2.4.32-2.4.39, when mod_remoteip was configured to use a trusted intermediary proxy server using the \"PROXY\" protocol, a specially crafted PROXY header could trigger a stack buffer overflow or NULL pointer deference. This vulnerability could only be triggered by a trusted proxy and not by untrusted HTTP clients.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:apache2-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-doc-2.4.33-lp151.8.6.1.noarch", "openSUSE Leap 15.0:apache2-event-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-event-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-devel-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-devel-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-doc-2.4.33-lp151.8.6.1.noarch", "openSUSE Leap 15.1:apache2-event-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-event-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-example-pages-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-example-pages-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-prefork-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-prefork-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-utils-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-utils-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-worker-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-worker-2.4.33-lp151.8.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-10097", "url": "https://www.suse.com/security/cve/CVE-2019-10097" }, { "category": "external", "summary": "SUSE Bug 1145739 for CVE-2019-10097", "url": "https://bugzilla.suse.com/1145739" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:apache2-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-doc-2.4.33-lp151.8.6.1.noarch", "openSUSE Leap 15.0:apache2-event-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-event-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-devel-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-devel-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-doc-2.4.33-lp151.8.6.1.noarch", "openSUSE Leap 15.1:apache2-event-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-event-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-example-pages-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-example-pages-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-prefork-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-prefork-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-utils-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-utils-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-worker-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-worker-2.4.33-lp151.8.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Leap 15.0:apache2-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-doc-2.4.33-lp151.8.6.1.noarch", "openSUSE Leap 15.0:apache2-event-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-event-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-devel-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-devel-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-doc-2.4.33-lp151.8.6.1.noarch", "openSUSE Leap 15.1:apache2-event-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-event-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-example-pages-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-example-pages-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-prefork-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-prefork-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-utils-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-utils-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-worker-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-worker-2.4.33-lp151.8.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-02T10:33:13Z", "details": "moderate" } ], "title": "CVE-2019-10097" }, { "cve": "CVE-2019-10098", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-10098" } ], "notes": [ { "category": "general", "text": "In Apache HTTP server 2.4.0 to 2.4.39, Redirects configured with mod_rewrite that were intended to be self-referential might be fooled by encoded newlines and redirect instead to an unexpected URL within the request URL.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:apache2-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-doc-2.4.33-lp151.8.6.1.noarch", "openSUSE Leap 15.0:apache2-event-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-event-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-devel-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-devel-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-doc-2.4.33-lp151.8.6.1.noarch", "openSUSE Leap 15.1:apache2-event-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-event-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-example-pages-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-example-pages-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-prefork-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-prefork-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-utils-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-utils-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-worker-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-worker-2.4.33-lp151.8.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-10098", "url": "https://www.suse.com/security/cve/CVE-2019-10098" }, { "category": "external", "summary": "SUSE Bug 1145738 for CVE-2019-10098", "url": "https://bugzilla.suse.com/1145738" }, { "category": "external", "summary": "SUSE Bug 1168407 for CVE-2019-10098", "url": "https://bugzilla.suse.com/1168407" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:apache2-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-doc-2.4.33-lp151.8.6.1.noarch", "openSUSE Leap 15.0:apache2-event-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-event-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-devel-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-devel-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-doc-2.4.33-lp151.8.6.1.noarch", "openSUSE Leap 15.1:apache2-event-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-event-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-example-pages-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-example-pages-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-prefork-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-prefork-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-utils-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-utils-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-worker-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-worker-2.4.33-lp151.8.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Leap 15.0:apache2-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-doc-2.4.33-lp151.8.6.1.noarch", "openSUSE Leap 15.0:apache2-event-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-event-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-devel-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-devel-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-doc-2.4.33-lp151.8.6.1.noarch", "openSUSE Leap 15.1:apache2-event-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-event-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-example-pages-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-example-pages-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-prefork-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-prefork-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-utils-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-utils-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-worker-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-worker-2.4.33-lp151.8.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-02T10:33:13Z", "details": "important" } ], "title": "CVE-2019-10098" }, { "cve": "CVE-2019-9517", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9517" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to unconstrained interal data buffering, potentially leading to a denial of service. The attacker opens the HTTP/2 window so the peer can send without constraint; however, they leave the TCP window closed so the peer cannot actually write (many of) the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the servers queue the responses, this can consume excess memory, CPU, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:apache2-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-doc-2.4.33-lp151.8.6.1.noarch", "openSUSE Leap 15.0:apache2-event-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-event-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-devel-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-devel-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-doc-2.4.33-lp151.8.6.1.noarch", "openSUSE Leap 15.1:apache2-event-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-event-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-example-pages-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-example-pages-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-prefork-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-prefork-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-utils-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-utils-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-worker-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-worker-2.4.33-lp151.8.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9517", "url": "https://www.suse.com/security/cve/CVE-2019-9517" }, { "category": "external", "summary": "SUSE Bug 1145575 for CVE-2019-9517", "url": "https://bugzilla.suse.com/1145575" }, { "category": "external", "summary": "SUSE Bug 1146097 for CVE-2019-9517", "url": "https://bugzilla.suse.com/1146097" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:apache2-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-doc-2.4.33-lp151.8.6.1.noarch", "openSUSE Leap 15.0:apache2-event-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-event-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-devel-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-devel-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-doc-2.4.33-lp151.8.6.1.noarch", "openSUSE Leap 15.1:apache2-event-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-event-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-example-pages-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-example-pages-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-prefork-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-prefork-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-utils-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-utils-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-worker-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-worker-2.4.33-lp151.8.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Leap 15.0:apache2-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-devel-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-doc-2.4.33-lp151.8.6.1.noarch", "openSUSE Leap 15.0:apache2-event-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-event-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-example-pages-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-prefork-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-utils-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.0:apache2-worker-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-devel-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-devel-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-doc-2.4.33-lp151.8.6.1.noarch", "openSUSE Leap 15.1:apache2-event-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-event-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-example-pages-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-example-pages-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-prefork-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-prefork-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-utils-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-utils-2.4.33-lp151.8.6.1.x86_64", "openSUSE Leap 15.1:apache2-worker-2.4.33-lp151.8.6.1.i586", "openSUSE Leap 15.1:apache2-worker-2.4.33-lp151.8.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-02T10:33:13Z", "details": "moderate" } ], "title": "CVE-2019-9517" } ] }
opensuse-su-2019:2114-1
Vulnerability from csaf_opensuse
Published
2019-09-10 16:22
Modified
2019-09-10 16:22
Summary
Security update for nodejs10
Notes
Title of the patch
Security update for nodejs10
Description of the patch
This update for nodejs10 to version 10.16.3 fixes the following issues:
Security issues fixed:
- CVE-2019-9511: Fixed HTTP/2 implementations that are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service (bsc#1146091).
- CVE-2019-9512: Fixed HTTP/2 flood using PING frames results in unbounded memory growth (bsc#1146099).
- CVE-2019-9513: Fixed HTTP/2 implementation that is vulnerable to resource loops, potentially leading to a denial of service. (bsc#1146094).
- CVE-2019-9514: Fixed HTTP/2 implementation that is vulnerable to a reset flood, potentially leading to a denial of service (bsc#1146095).
- CVE-2019-9515: Fixed HTTP/2 flood using SETTINGS frames results in unbounded memory growth (bsc#1146100).
- CVE-2019-9516: Fixed HTTP/2 implementation that is vulnerable to a header leak, potentially leading to a denial of service (bsc#1146090).
- CVE-2019-9517: Fixed HTTP/2 implementations that are vulnerable to unconstrained interal data buffering (bsc#1146097).
- CVE-2019-9518: Fixed HTTP/2 implementation that is vulnerable to a flood of empty frames, potentially leading to a denial of service (bsc#1146093).
This update was imported from the SUSE:SLE-15:Update update project.
Patchnames
openSUSE-2019-2114
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for nodejs10", "title": "Title of the patch" }, { "category": "description", "text": "This update for nodejs10 to version 10.16.3 fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2019-9511: Fixed HTTP/2 implementations that are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service (bsc#1146091).\n- CVE-2019-9512: Fixed HTTP/2 flood using PING frames results in unbounded memory growth (bsc#1146099).\n- CVE-2019-9513: Fixed HTTP/2 implementation that is vulnerable to resource loops, potentially leading to a denial of service. (bsc#1146094).\n- CVE-2019-9514: Fixed HTTP/2 implementation that is vulnerable to a reset flood, potentially leading to a denial of service (bsc#1146095).\n- CVE-2019-9515: Fixed HTTP/2 flood using SETTINGS frames results in unbounded memory growth (bsc#1146100).\n- CVE-2019-9516: Fixed HTTP/2 implementation that is vulnerable to a header leak, potentially leading to a denial of service (bsc#1146090).\n- CVE-2019-9517: Fixed HTTP/2 implementations that are vulnerable to unconstrained interal data buffering (bsc#1146097).\n- CVE-2019-9518: Fixed HTTP/2 implementation that is vulnerable to a flood of empty frames, potentially leading to a denial of service (bsc#1146093).\n\nThis update was imported from the SUSE:SLE-15:Update update project.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2019-2114", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_2114-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2019:2114-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R3H4KAW53AW5JRYOIFARBV2NZCYA2XCC/#R3H4KAW53AW5JRYOIFARBV2NZCYA2XCC" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2019:2114-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R3H4KAW53AW5JRYOIFARBV2NZCYA2XCC/#R3H4KAW53AW5JRYOIFARBV2NZCYA2XCC" }, { "category": "self", "summary": "SUSE Bug 1146090", "url": "https://bugzilla.suse.com/1146090" }, { "category": "self", "summary": "SUSE Bug 1146091", "url": "https://bugzilla.suse.com/1146091" }, { "category": "self", "summary": "SUSE Bug 1146093", "url": "https://bugzilla.suse.com/1146093" }, { "category": "self", "summary": "SUSE Bug 1146094", "url": "https://bugzilla.suse.com/1146094" }, { "category": "self", "summary": "SUSE Bug 1146095", "url": "https://bugzilla.suse.com/1146095" }, { "category": "self", "summary": "SUSE Bug 1146097", "url": "https://bugzilla.suse.com/1146097" }, { "category": "self", "summary": "SUSE Bug 1146099", "url": "https://bugzilla.suse.com/1146099" }, { "category": "self", "summary": "SUSE Bug 1146100", "url": "https://bugzilla.suse.com/1146100" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9511 page", "url": "https://www.suse.com/security/cve/CVE-2019-9511/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9512 page", "url": "https://www.suse.com/security/cve/CVE-2019-9512/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9513 page", "url": "https://www.suse.com/security/cve/CVE-2019-9513/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9514 page", "url": "https://www.suse.com/security/cve/CVE-2019-9514/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9515 page", "url": "https://www.suse.com/security/cve/CVE-2019-9515/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9516 page", "url": "https://www.suse.com/security/cve/CVE-2019-9516/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9517 page", "url": "https://www.suse.com/security/cve/CVE-2019-9517/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9518 page", "url": "https://www.suse.com/security/cve/CVE-2019-9518/" } ], "title": "Security update for nodejs10", "tracking": { "current_release_date": "2019-09-10T16:22:24Z", "generator": { "date": "2019-09-10T16:22:24Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2019:2114-1", "initial_release_date": "2019-09-10T16:22:24Z", "revision_history": [ { "date": "2019-09-10T16:22:24Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "nodejs10-10.16.3-lp151.2.6.1.i586", "product": { "name": "nodejs10-10.16.3-lp151.2.6.1.i586", "product_id": "nodejs10-10.16.3-lp151.2.6.1.i586" } }, { "category": "product_version", "name": "nodejs10-devel-10.16.3-lp151.2.6.1.i586", "product": { "name": "nodejs10-devel-10.16.3-lp151.2.6.1.i586", "product_id": "nodejs10-devel-10.16.3-lp151.2.6.1.i586" } }, { "category": "product_version", "name": "npm10-10.16.3-lp151.2.6.1.i586", "product": { "name": "npm10-10.16.3-lp151.2.6.1.i586", "product_id": "npm10-10.16.3-lp151.2.6.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "product": { "name": "nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "product_id": "nodejs10-docs-10.16.3-lp151.2.6.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "nodejs10-10.16.3-lp151.2.6.1.x86_64", "product": { "name": "nodejs10-10.16.3-lp151.2.6.1.x86_64", "product_id": "nodejs10-10.16.3-lp151.2.6.1.x86_64" } }, { "category": "product_version", "name": "nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "product": { "name": "nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "product_id": "nodejs10-devel-10.16.3-lp151.2.6.1.x86_64" } }, { "category": "product_version", "name": "npm10-10.16.3-lp151.2.6.1.x86_64", "product": { "name": "npm10-10.16.3-lp151.2.6.1.x86_64", "product_id": "npm10-10.16.3-lp151.2.6.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Leap 15.0", "product": { "name": "openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.0" } } }, { "category": "product_name", "name": "openSUSE Leap 15.1", "product": { "name": "openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.16.3-lp151.2.6.1.i586 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.i586" }, "product_reference": "nodejs10-10.16.3-lp151.2.6.1.i586", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.16.3-lp151.2.6.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.x86_64" }, "product_reference": "nodejs10-10.16.3-lp151.2.6.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.16.3-lp151.2.6.1.i586 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.i586" }, "product_reference": "nodejs10-devel-10.16.3-lp151.2.6.1.i586", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.16.3-lp151.2.6.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64" }, "product_reference": "nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-docs-10.16.3-lp151.2.6.1.noarch as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:nodejs10-docs-10.16.3-lp151.2.6.1.noarch" }, "product_reference": "nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.16.3-lp151.2.6.1.i586 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.i586" }, "product_reference": "npm10-10.16.3-lp151.2.6.1.i586", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.16.3-lp151.2.6.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.x86_64" }, "product_reference": "npm10-10.16.3-lp151.2.6.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.16.3-lp151.2.6.1.i586 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.i586" }, "product_reference": "nodejs10-10.16.3-lp151.2.6.1.i586", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.16.3-lp151.2.6.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.x86_64" }, "product_reference": "nodejs10-10.16.3-lp151.2.6.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.16.3-lp151.2.6.1.i586 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.i586" }, "product_reference": "nodejs10-devel-10.16.3-lp151.2.6.1.i586", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.16.3-lp151.2.6.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64" }, "product_reference": "nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-docs-10.16.3-lp151.2.6.1.noarch as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:nodejs10-docs-10.16.3-lp151.2.6.1.noarch" }, "product_reference": "nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.16.3-lp151.2.6.1.i586 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.i586" }, "product_reference": "npm10-10.16.3-lp151.2.6.1.i586", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.16.3-lp151.2.6.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.x86_64" }, "product_reference": "npm10-10.16.3-lp151.2.6.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-9511", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9511" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9511", "url": "https://www.suse.com/security/cve/CVE-2019-9511" }, { "category": "external", "summary": "SUSE Bug 1145579 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1145579" }, { "category": "external", "summary": "SUSE Bug 1146091 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1146091" }, { "category": "external", "summary": "SUSE Bug 1146182 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1146182" }, { "category": "external", "summary": "SUSE Bug 1193427 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1193427" }, { "category": "external", "summary": "SUSE Bug 1202787 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1202787" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-10T16:22:24Z", "details": "low" } ], "title": "CVE-2019-9511" }, { "cve": "CVE-2019-9512", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9512" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9512", "url": "https://www.suse.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146099 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1146099" }, { "category": "external", "summary": "SUSE Bug 1146111 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1146111" }, { "category": "external", "summary": "SUSE Bug 1147142 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1147142" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-10T16:22:24Z", "details": "important" } ], "title": "CVE-2019-9512" }, { "cve": "CVE-2019-9513", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9513" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9513", "url": "https://www.suse.com/security/cve/CVE-2019-9513" }, { "category": "external", "summary": "SUSE Bug 1145580 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1145580" }, { "category": "external", "summary": "SUSE Bug 1146094 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1146094" }, { "category": "external", "summary": "SUSE Bug 1146184 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1146184" }, { "category": "external", "summary": "SUSE Bug 1193427 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1193427" }, { "category": "external", "summary": "SUSE Bug 1202787 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1202787" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-10T16:22:24Z", "details": "low" } ], "title": "CVE-2019-9513" }, { "cve": "CVE-2019-9514", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9514" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9514", "url": "https://www.suse.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "SUSE Bug 1145662 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1145662" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146095 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1146095" }, { "category": "external", "summary": "SUSE Bug 1146115 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1146115" }, { "category": "external", "summary": "SUSE Bug 1147142 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1147142" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-10T16:22:24Z", "details": "important" } ], "title": "CVE-2019-9514" }, { "cve": "CVE-2019-9515", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9515" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to a settings flood, potentially leading to a denial of service. The attacker sends a stream of SETTINGS frames to the peer. Since the RFC requires that the peer reply with one acknowledgement per SETTINGS frame, an empty SETTINGS frame is almost equivalent in behavior to a ping. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9515", "url": "https://www.suse.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9515", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146100 for CVE-2019-9515", "url": "https://bugzilla.suse.com/1146100" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-10T16:22:24Z", "details": "important" } ], "title": "CVE-2019-9515" }, { "cve": "CVE-2019-9516", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9516" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service. The attacker sends a stream of headers with a 0-length header name and 0-length header value, optionally Huffman encoded into 1-byte or greater headers. Some implementations allocate memory for these headers and keep the allocation alive until the session dies. This can consume excess memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9516", "url": "https://www.suse.com/security/cve/CVE-2019-9516" }, { "category": "external", "summary": "SUSE Bug 1145582 for CVE-2019-9516", "url": "https://bugzilla.suse.com/1145582" }, { "category": "external", "summary": "SUSE Bug 1146090 for CVE-2019-9516", "url": "https://bugzilla.suse.com/1146090" }, { "category": "external", "summary": "SUSE Bug 1193427 for CVE-2019-9516", "url": "https://bugzilla.suse.com/1193427" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-10T16:22:24Z", "details": "low" } ], "title": "CVE-2019-9516" }, { "cve": "CVE-2019-9517", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9517" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to unconstrained interal data buffering, potentially leading to a denial of service. The attacker opens the HTTP/2 window so the peer can send without constraint; however, they leave the TCP window closed so the peer cannot actually write (many of) the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the servers queue the responses, this can consume excess memory, CPU, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9517", "url": "https://www.suse.com/security/cve/CVE-2019-9517" }, { "category": "external", "summary": "SUSE Bug 1145575 for CVE-2019-9517", "url": "https://bugzilla.suse.com/1145575" }, { "category": "external", "summary": "SUSE Bug 1146097 for CVE-2019-9517", "url": "https://bugzilla.suse.com/1146097" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-10T16:22:24Z", "details": "moderate" } ], "title": "CVE-2019-9517" }, { "cve": "CVE-2019-9518", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9518" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leading to a denial of service. The attacker sends a stream of frames with an empty payload and without the end-of-stream flag. These frames can be DATA, HEADERS, CONTINUATION and/or PUSH_PROMISE. The peer spends time processing each frame disproportionate to attack bandwidth. This can consume excess CPU.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9518", "url": "https://www.suse.com/security/cve/CVE-2019-9518" }, { "category": "external", "summary": "SUSE Bug 1145662 for CVE-2019-9518", "url": "https://bugzilla.suse.com/1145662" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9518", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146093 for CVE-2019-9518", "url": "https://bugzilla.suse.com/1146093" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-10T16:22:24Z", "details": "important" } ], "title": "CVE-2019-9518" } ] }
fkie_cve-2019-9517
Vulnerability from fkie_nvd
Published
2019-08-13 21:15
Modified
2025-01-14 19:29
Severity ?
Summary
Some HTTP/2 implementations are vulnerable to unconstrained interal data buffering, potentially leading to a denial of service. The attacker opens the HTTP/2 window so the peer can send without constraint; however, they leave the TCP window closed so the peer cannot actually write (many of) the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the servers queue the responses, this can consume excess memory, CPU, or both.
References
▶ | URL | Tags | |
---|---|---|---|
cret@cert.org | http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00004.html | Mailing List, Third Party Advisory | |
cret@cert.org | http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html | Mailing List, Third Party Advisory | |
cret@cert.org | http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html | Mailing List, Third Party Advisory | |
cret@cert.org | http://www.openwall.com/lists/oss-security/2019/08/15/7 | Mailing List, Third Party Advisory | |
cret@cert.org | https://access.redhat.com/errata/RHSA-2019:2893 | Third Party Advisory | |
cret@cert.org | https://access.redhat.com/errata/RHSA-2019:2925 | Third Party Advisory | |
cret@cert.org | https://access.redhat.com/errata/RHSA-2019:2939 | Third Party Advisory | |
cret@cert.org | https://access.redhat.com/errata/RHSA-2019:2946 | Third Party Advisory | |
cret@cert.org | https://access.redhat.com/errata/RHSA-2019:2949 | Third Party Advisory | |
cret@cert.org | https://access.redhat.com/errata/RHSA-2019:2950 | Third Party Advisory | |
cret@cert.org | https://access.redhat.com/errata/RHSA-2019:2955 | Third Party Advisory | |
cret@cert.org | https://access.redhat.com/errata/RHSA-2019:3932 | Third Party Advisory | |
cret@cert.org | https://access.redhat.com/errata/RHSA-2019:3933 | Third Party Advisory | |
cret@cert.org | https://access.redhat.com/errata/RHSA-2019:3935 | Third Party Advisory | |
cret@cert.org | https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md | Third Party Advisory | |
cret@cert.org | https://kb.cert.org/vuls/id/605641/ | Third Party Advisory, US Government Resource | |
cret@cert.org | https://kc.mcafee.com/corporate/index?page=content&id=SB10296 | Third Party Advisory | |
cret@cert.org | https://lists.apache.org/thread.html/4610762456644181b267c846423b3a990bd4aaea1886ecc7d51febdb%40%3Cannounce.httpd.apache.org%3E | ||
cret@cert.org | https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E | ||
cret@cert.org | https://lists.apache.org/thread.html/d89f999e26dfb1d50f247ead1fe8538014eb412b2dbe5be4b1a9ef50%40%3Cdev.httpd.apache.org%3E | ||
cret@cert.org | https://lists.apache.org/thread.html/ec97fdfc1a859266e56fef084353a34e0a0b08901b3c1aa317a43c8c%40%3Cdev.httpd.apache.org%3E | ||
cret@cert.org | https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d%40%3Ccvs.httpd.apache.org%3E | ||
cret@cert.org | https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E | ||
cret@cert.org | https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36%40%3Ccvs.httpd.apache.org%3E | ||
cret@cert.org | https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E | ||
cret@cert.org | https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E | ||
cret@cert.org | https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E | ||
cret@cert.org | https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E | ||
cret@cert.org | https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538%40%3Ccvs.httpd.apache.org%3E | ||
cret@cert.org | https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E | ||
cret@cert.org | https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E | ||
cret@cert.org | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC/ | ||
cret@cert.org | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BP556LEG3WENHZI5TAQ6ZEBFTJB4E2IS/ | ||
cret@cert.org | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP/ | ||
cret@cert.org | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XHTKU7YQ5EEP2XNSAV4M4VJ7QCBOJMOD/ | ||
cret@cert.org | https://seclists.org/bugtraq/2019/Aug/47 | Mailing List, Third Party Advisory | |
cret@cert.org | https://security.gentoo.org/glsa/201909-04 | Third Party Advisory | |
cret@cert.org | https://security.netapp.com/advisory/ntap-20190823-0003/ | Third Party Advisory | |
cret@cert.org | https://security.netapp.com/advisory/ntap-20190823-0005/ | Third Party Advisory | |
cret@cert.org | https://security.netapp.com/advisory/ntap-20190905-0003/ | Third Party Advisory | |
cret@cert.org | https://support.f5.com/csp/article/K02591030 | Third Party Advisory | |
cret@cert.org | https://support.f5.com/csp/article/K02591030?utm_source=f5support&%3Butm_medium=RSS | ||
cret@cert.org | https://usn.ubuntu.com/4113-1/ | Third Party Advisory | |
cret@cert.org | https://www.debian.org/security/2019/dsa-4509 | Third Party Advisory | |
cret@cert.org | https://www.oracle.com/security-alerts/cpuapr2020.html | Third Party Advisory | |
cret@cert.org | https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html | Patch, Third Party Advisory | |
cret@cert.org | https://www.synology.com/security/advisory/Synology_SA_19_33 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00004.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2019/08/15/7 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2019:2893 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2019:2925 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2019:2939 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2019:2946 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2019:2949 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2019:2950 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2019:2955 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2019:3932 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2019:3933 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2019:3935 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://kb.cert.org/vuls/id/605641/ | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://kc.mcafee.com/corporate/index?page=content&id=SB10296 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/4610762456644181b267c846423b3a990bd4aaea1886ecc7d51febdb%40%3Cannounce.httpd.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/d89f999e26dfb1d50f247ead1fe8538014eb412b2dbe5be4b1a9ef50%40%3Cdev.httpd.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/ec97fdfc1a859266e56fef084353a34e0a0b08901b3c1aa317a43c8c%40%3Cdev.httpd.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d%40%3Ccvs.httpd.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36%40%3Ccvs.httpd.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538%40%3Ccvs.httpd.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BP556LEG3WENHZI5TAQ6ZEBFTJB4E2IS/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XHTKU7YQ5EEP2XNSAV4M4VJ7QCBOJMOD/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://seclists.org/bugtraq/2019/Aug/47 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/201909-04 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20190823-0003/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20190823-0005/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20190905-0003/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.f5.com/csp/article/K02591030 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.f5.com/csp/article/K02591030?utm_source=f5support&%3Butm_medium=RSS | ||
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/4113-1/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2019/dsa-4509 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/security-alerts/cpuapr2020.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.synology.com/security/advisory/Synology_SA_19_33 | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apple | swiftnio | * | |
apple | mac_os_x | * | |
canonical | ubuntu_linux | * | |
apache | http_server | * | |
apache | traffic_server | * | |
apache | traffic_server | * | |
apache | traffic_server | * | |
canonical | ubuntu_linux | 16.04 | |
canonical | ubuntu_linux | 18.04 | |
canonical | ubuntu_linux | 19.04 | |
debian | debian_linux | 9.0 | |
debian | debian_linux | 10.0 | |
synology | skynas | - | |
synology | diskstation_manager | 6.2 | |
synology | vs960hd_firmware | - | |
synology | vs960hd | - | |
fedoraproject | fedora | 29 | |
fedoraproject | fedora | 30 | |
opensuse | leap | 15.0 | |
opensuse | leap | 15.1 | |
redhat | jboss_core_services | 1.0 | |
redhat | jboss_enterprise_application_platform | 7.2.0 | |
redhat | jboss_enterprise_application_platform | 7.3.0 | |
redhat | openshift_service_mesh | 1.0 | |
redhat | quay | 3.0.0 | |
redhat | software_collections | 1.0 | |
redhat | enterprise_linux | 8.0 | |
oracle | communications_element_manager | 8.0.0 | |
oracle | communications_element_manager | 8.1.0 | |
oracle | communications_element_manager | 8.1.1 | |
oracle | communications_element_manager | 8.2.0 | |
oracle | graalvm | 19.2.0 | |
oracle | instantis_enterprisetrack | * | |
oracle | retail_xstore_point_of_service | 7.1 | |
mcafee | web_gateway | * | |
mcafee | web_gateway | * | |
mcafee | web_gateway | * | |
netapp | clustered_data_ontap | - | |
nodejs | node.js | * | |
nodejs | node.js | * | |
nodejs | node.js | * | |
nodejs | node.js | * | |
nodejs | node.js | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apple:swiftnio:*:*:*:*:*:*:*:*", "matchCriteriaId": "93988E60-006B-434D-AB16-1FA1D2FEBC2A", "versionEndIncluding": "1.4.0", "versionStartIncluding": "1.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "1D294D56-E784-4DA8-9C2C-BC5A05C92C0C", "versionStartIncluding": "10.12", "vulnerable": false }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:*:*:*:*:*:*:*:*", "matchCriteriaId": "65B1D2F6-BC1F-47AF-B4E6-4B50986AC622", "versionStartIncluding": "14.04", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "EAC639E9-54EB-4EBD-A444-30B2E068EC9E", "versionEndExcluding": "2.4.40", "versionStartIncluding": "2.4.20", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "603BF43B-FC99-4039-A3C0-467F015A32FA", "versionEndIncluding": "6.2.3", "versionStartIncluding": "6.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "07BB02CE-D4F2-459C-B0C6-FF78BF7996AE", "versionEndIncluding": "7.1.6", "versionStartIncluding": "7.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "D875E0D8-D109-4F7F-A4C4-9EDD66CEE74E", "versionEndIncluding": "8.0.3", "versionStartIncluding": "8.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*", "matchCriteriaId": "CD783B0C-9246-47D9-A937-6144FE8BFF0F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:synology:skynas:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C997777-BE79-4F77-90D7-E1A71D474D88", "vulnerable": true }, { "criteria": "cpe:2.3:o:synology:diskstation_manager:6.2:*:*:*:*:*:*:*", "matchCriteriaId": "D9685B12-824F-42AD-B87C-6E7A78BB7FA5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:synology:vs960hd_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D0C5120-B961-440F-B454-584BC54B549C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:synology:vs960hd:-:*:*:*:*:*:*:*", "matchCriteriaId": "1CCBDFF9-AF42-4681-879B-CF789EBAD130", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*", "matchCriteriaId": "D100F7CE-FC64-4CC6-852A-6136D72DA419", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "matchCriteriaId": "97A4B8DF-58DA-4AB6-A1F9-331B36409BA3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "matchCriteriaId": "F1E78106-58E6-4D59-990F-75DA575BFAD9", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:jboss_core_services:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "A2466282-51AB-478D-9FF4-FA524265ED2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "0952BA1A-5DF9-400F-B01F-C3A398A8A2D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "8B157A2D-3422-4224-82D9-15AB3B989075", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:openshift_service_mesh:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "732F14CE-7994-4DD2-A28B-AE9E79826C01", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1987BDA-0113-4603-B9BE-76647EB043F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:software_collections:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "9D7EE4B6-A6EC-4B9B-91DF-79615796673F", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:communications_element_manager:8.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "ED5503EC-63B6-47EB-AE37-14DD317DDDD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_element_manager:8.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "A99F85F8-F374-48B0-9534-BB9C07AFE76E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_element_manager:8.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "0C57FD3A-0CC1-4BA9-879A-8C4A40234162", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_element_manager:8.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "698FB6D0-B26F-4760-9B9B-1C65FBFF2126", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:graalvm:19.2.0:*:*:*:enterprise:*:*:*", "matchCriteriaId": "C120C2F1-D50D-49CC-8E96-207ACCA49674", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:instantis_enterprisetrack:*:*:*:*:*:*:*:*", "matchCriteriaId": "9A74FD5F-4FEA-4A74-8B92-72DFDE6BA464", "versionEndIncluding": "17.3", "versionStartIncluding": "17.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:retail_xstore_point_of_service:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "A0ED83E3-E6BF-4EAA-AF8F-33485A88A218", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "765E9856-2748-4A8B-91F5-A4DB3C8C547A", "versionEndExcluding": "7.7.2.24", "versionStartIncluding": "7.7.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "EE6E66B1-3291-4E8E-93D6-30E9FDCF983E", "versionEndExcluding": "7.8.2.13", "versionStartIncluding": "7.8.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "227104AD-396D-4ADD-87C7-C4CD5583DA04", "versionEndExcluding": "8.2.0", "versionStartIncluding": "8.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*", "matchCriteriaId": "1FE996B1-6951-4F85-AA58-B99A379D2163", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*", "matchCriteriaId": "74FB695D-2C76-47AB-988E-5629D2E695E5", "versionEndIncluding": "8.8.1", "versionStartIncluding": "8.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*", "matchCriteriaId": "CFC0252A-DF1D-4CF4-B450-27267227B599", "versionEndExcluding": "8.16.1", "versionStartIncluding": "8.9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*", "matchCriteriaId": "25A3180B-21AF-4010-9DAB-41ADFD2D8031", "versionEndIncluding": "10.12.0", "versionStartIncluding": "10.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*", "matchCriteriaId": "2EC65858-FF7B-4171-82EA-80942D426F40", "versionEndExcluding": "10.16.3", "versionStartIncluding": "10.13.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*", "matchCriteriaId": "F522C500-AA33-4029-865F-F27FB00A354E", "versionEndExcluding": "12.8.1", "versionStartIncluding": "12.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Some HTTP/2 implementations are vulnerable to unconstrained interal data buffering, potentially leading to a denial of service. The attacker opens the HTTP/2 window so the peer can send without constraint; however, they leave the TCP window closed so the peer cannot actually write (many of) the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the servers queue the responses, this can consume excess memory, CPU, or both." }, { "lang": "es", "value": "Algunas implementaciones HTTP / 2 son vulnerables al almacenamiento en b\u00fafer de datos interal sin restricciones, lo que puede conducir a una denegaci\u00f3n de servicio. El atacante abre la ventana HTTP / 2 para que el par pueda enviar sin restricciones; sin embargo, dejan la ventana TCP cerrada para que el igual no pueda escribir (muchos de) los bytes en el cable. El atacante luego env\u00eda una secuencia de solicitudes para un objeto de respuesta grande. Dependiendo de c\u00f3mo los servidores ponen en cola las respuestas, esto puede consumir un exceso de memoria, CPU o ambos." } ], "id": "CVE-2019-9517", "lastModified": "2025-01-14T19:29:55.853", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "cret@cert.org", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-08-13T21:15:12.647", "references": [ { "source": "cret@cert.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00004.html" }, { "source": "cret@cert.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html" }, { "source": "cret@cert.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html" }, { "source": "cret@cert.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2019/08/15/7" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2893" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2925" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2939" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2946" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2949" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2950" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2955" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3932" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3933" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3935" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://kb.cert.org/vuls/id/605641/" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10296" }, { "source": "cret@cert.org", "url": "https://lists.apache.org/thread.html/4610762456644181b267c846423b3a990bd4aaea1886ecc7d51febdb%40%3Cannounce.httpd.apache.org%3E" }, { "source": "cret@cert.org", "url": "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E" }, { "source": "cret@cert.org", "url": "https://lists.apache.org/thread.html/d89f999e26dfb1d50f247ead1fe8538014eb412b2dbe5be4b1a9ef50%40%3Cdev.httpd.apache.org%3E" }, { "source": "cret@cert.org", "url": "https://lists.apache.org/thread.html/ec97fdfc1a859266e56fef084353a34e0a0b08901b3c1aa317a43c8c%40%3Cdev.httpd.apache.org%3E" }, { "source": "cret@cert.org", "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d%40%3Ccvs.httpd.apache.org%3E" }, { "source": "cret@cert.org", "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E" }, { "source": "cret@cert.org", "url": "https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36%40%3Ccvs.httpd.apache.org%3E" }, { "source": "cret@cert.org", "url": "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E" }, { "source": "cret@cert.org", "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E" }, { "source": "cret@cert.org", "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E" }, { "source": "cret@cert.org", "url": "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E" }, { "source": "cret@cert.org", "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538%40%3Ccvs.httpd.apache.org%3E" }, { "source": "cret@cert.org", "url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E" }, { "source": "cret@cert.org", "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E" }, { "source": "cret@cert.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC/" }, { "source": "cret@cert.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BP556LEG3WENHZI5TAQ6ZEBFTJB4E2IS/" }, { "source": "cret@cert.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP/" }, { "source": "cret@cert.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XHTKU7YQ5EEP2XNSAV4M4VJ7QCBOJMOD/" }, { "source": "cret@cert.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://seclists.org/bugtraq/2019/Aug/47" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201909-04" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20190823-0003/" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20190823-0005/" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20190905-0003/" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory" ], "url": "https://support.f5.com/csp/article/K02591030" }, { "source": "cret@cert.org", "url": "https://support.f5.com/csp/article/K02591030?utm_source=f5support\u0026amp%3Butm_medium=RSS" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4113-1/" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2019/dsa-4509" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "source": "cret@cert.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory" ], "url": "https://www.synology.com/security/advisory/Synology_SA_19_33" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00004.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2019/08/15/7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2893" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2925" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2939" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2946" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2949" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2950" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2955" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3932" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3933" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3935" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://kb.cert.org/vuls/id/605641/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10296" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/4610762456644181b267c846423b3a990bd4aaea1886ecc7d51febdb%40%3Cannounce.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/d89f999e26dfb1d50f247ead1fe8538014eb412b2dbe5be4b1a9ef50%40%3Cdev.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/ec97fdfc1a859266e56fef084353a34e0a0b08901b3c1aa317a43c8c%40%3Cdev.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BP556LEG3WENHZI5TAQ6ZEBFTJB4E2IS/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XHTKU7YQ5EEP2XNSAV4M4VJ7QCBOJMOD/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://seclists.org/bugtraq/2019/Aug/47" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201909-04" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20190823-0003/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20190823-0005/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20190905-0003/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.f5.com/csp/article/K02591030" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://support.f5.com/csp/article/K02591030?utm_source=f5support\u0026amp%3Butm_medium=RSS" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4113-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2019/dsa-4509" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.synology.com/security/advisory/Synology_SA_19_33" } ], "sourceIdentifier": "cret@cert.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-400" } ], "source": "cret@cert.org", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-770" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
gsd-2019-9517
Vulnerability from gsd
Modified
2023-12-13 01:23
Details
Some HTTP/2 implementations are vulnerable to unconstrained interal data buffering, potentially leading to a denial of service. The attacker opens the HTTP/2 window so the peer can send without constraint; however, they leave the TCP window closed so the peer cannot actually write (many of) the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the servers queue the responses, this can consume excess memory, CPU, or both.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2019-9517", "description": "Some HTTP/2 implementations are vulnerable to unconstrained interal data buffering, potentially leading to a denial of service. The attacker opens the HTTP/2 window so the peer can send without constraint; however, they leave the TCP window closed so the peer cannot actually write (many of) the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the servers queue the responses, this can consume excess memory, CPU, or both.", "id": "GSD-2019-9517", "references": [ "https://www.suse.com/security/cve/CVE-2019-9517.html", "https://www.debian.org/security/2019/dsa-4509", "https://access.redhat.com/errata/RHSA-2020:1445", "https://access.redhat.com/errata/RHSA-2020:0983", "https://access.redhat.com/errata/RHSA-2020:0922", "https://access.redhat.com/errata/RHSA-2019:3935", "https://access.redhat.com/errata/RHSA-2019:3933", "https://access.redhat.com/errata/RHSA-2019:3932", "https://access.redhat.com/errata/RHSA-2019:2955", "https://access.redhat.com/errata/RHSA-2019:2950", "https://access.redhat.com/errata/RHSA-2019:2949", "https://access.redhat.com/errata/RHSA-2019:2946", "https://access.redhat.com/errata/RHSA-2019:2939", "https://access.redhat.com/errata/RHSA-2019:2925", "https://access.redhat.com/errata/RHSA-2019:2893", "https://ubuntu.com/security/CVE-2019-9517", "https://advisories.mageia.org/CVE-2019-9517.html", "https://alas.aws.amazon.com/cve/html/CVE-2019-9517.html", "https://linux.oracle.com/cve/CVE-2019-9517.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2019-9517" ], "details": "Some HTTP/2 implementations are vulnerable to unconstrained interal data buffering, potentially leading to a denial of service. The attacker opens the HTTP/2 window so the peer can send without constraint; however, they leave the TCP window closed so the peer cannot actually write (many of) the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the servers queue the responses, this can consume excess memory, CPU, or both.", "id": "GSD-2019-9517", "modified": "2023-12-13T01:23:47.392520Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "AKA": "HTTP/2 Internal Data Buffering", "ASSIGNER": "cert@cert.org", "ID": "CVE-2019-9517", "STATE": "PUBLIC", "TITLE": "Some HTTP/2 implementations are vulnerable to unconstrained interal data buffering, potentially leading to a denial of service" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "credit": [ { "lang": "eng", "value": "Thanks to Jonathan Looney of Netflix for reporting this vulnerability." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Some HTTP/2 implementations are vulnerable to unconstrained interal data buffering, potentially leading to a denial of service. The attacker opens the HTTP/2 window so the peer can send without constraint; however, they leave the TCP window closed so the peer cannot actually write (many of) the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the servers queue the responses, this can consume excess memory, CPU, or both." } ] }, "generator": { "engine": "Vulnogram 0.0.7" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-400 Uncontrolled Resource Consumption" } ] } ] }, "references": { "reference_data": [ { "name": "VU#605641", "refsource": "CERT-VN", "url": "https://kb.cert.org/vuls/id/605641/" }, { "name": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "refsource": "MISC", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "name": "[httpd-announce] 20190814 CVE-2019-9517: mod_http2, DoS attack by exhausting h2 workers", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/4610762456644181b267c846423b3a990bd4aaea1886ecc7d51febdb@%3Cannounce.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048743 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E" }, { "name": "[oss-security] 20190814 CVE-2019-9517: mod_http2, DoS attack by exhausting h2 workers", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2019/08/15/7" }, { "name": "[httpd-dev] 20190817 CVE-2019-10097 vs. CHANGEs entry", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/ec97fdfc1a859266e56fef084353a34e0a0b08901b3c1aa317a43c8c@%3Cdev.httpd.apache.org%3E" }, { "name": "[httpd-dev] 20190817 Re: CVE-2019-10097 vs. CHANGEs entry", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/d89f999e26dfb1d50f247ead1fe8538014eb412b2dbe5be4b1a9ef50@%3Cdev.httpd.apache.org%3E" }, { "name": "https://www.synology.com/security/advisory/Synology_SA_19_33", "refsource": "CONFIRM", "url": "https://www.synology.com/security/advisory/Synology_SA_19_33" }, { "name": "https://support.f5.com/csp/article/K02591030", "refsource": "CONFIRM", "url": "https://support.f5.com/csp/article/K02591030" }, { "name": "https://security.netapp.com/advisory/ntap-20190823-0005/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20190823-0005/" }, { "name": "https://security.netapp.com/advisory/ntap-20190823-0003/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20190823-0003/" }, { "name": "FEDORA-2019-5a6a7bc12c", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP/" }, { "name": "FEDORA-2019-6a2980de56", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC/" }, { "name": "DSA-4509", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2019/dsa-4509" }, { "name": "20190826 [SECURITY] [DSA 4509-1] apache2 security update", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2019/Aug/47" }, { "name": "USN-4113-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4113-1/" }, { "name": "FEDORA-2019-4427fd65be", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BP556LEG3WENHZI5TAQ6ZEBFTJB4E2IS/" }, { "name": "FEDORA-2019-63ba15cc83", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XHTKU7YQ5EEP2XNSAV4M4VJ7QCBOJMOD/" }, { "name": "openSUSE-SU-2019:2051", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00004.html" }, { "name": "https://security.netapp.com/advisory/ntap-20190905-0003/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20190905-0003/" }, { "name": "GLSA-201909-04", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201909-04" }, { "name": "openSUSE-SU-2019:2114", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html" }, { "name": "openSUSE-SU-2019:2115", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html" }, { "name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10296", "refsource": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10296" }, { "name": "RHSA-2019:2893", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:2893" }, { "name": "RHSA-2019:2925", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:2925" }, { "name": "RHSA-2019:2939", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:2939" }, { "name": "RHSA-2019:2946", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:2946" }, { "name": "RHSA-2019:2950", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:2950" }, { "name": "RHSA-2019:2949", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:2949" }, { "name": "RHSA-2019:2955", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:2955" }, { "name": "https://support.f5.com/csp/article/K02591030?utm_source=f5support\u0026amp;utm_medium=RSS", "refsource": "CONFIRM", "url": "https://support.f5.com/csp/article/K02591030?utm_source=f5support\u0026amp;utm_medium=RSS" }, { "name": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html", "refsource": "MISC", "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html" }, { "name": "RHSA-2019:3933", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:3933" }, { "name": "RHSA-2019:3935", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:3935" }, { "name": "RHSA-2019:3932", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:3932" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058586 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E" }, { "name": "https://www.oracle.com/security-alerts/cpuapr2020.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073149 [13/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210606 svn commit: r1075470 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E" } ] }, "source": { "discovery": "UNKNOWN" } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:apple:swiftnio:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.4.0", "versionStartIncluding": "1.0.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe_name": [], "versionStartIncluding": "10.12", "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:*:*:*:*:*:*:*:*", "cpe_name": [], "versionStartIncluding": "14.04", "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "8.0.3", "versionStartIncluding": "8.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "7.1.6", "versionStartIncluding": "7.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "6.2.3", "versionStartIncluding": "6.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.4.40", "versionStartIncluding": "2.4.20", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:synology:skynas:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:synology:diskstation_manager:6.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:synology:vs960hd_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:synology:vs960hd:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:redhat:software_collections:1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:jboss_core_services:1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:openshift_service_mesh:1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:oracle:retail_xstore_point_of_service:7.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:graalvm:19.2.0:*:*:*:enterprise:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:instantis_enterprisetrack:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "17.3", "versionStartIncluding": "17.1", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:communications_element_manager:8.2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:communications_element_manager:8.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:communications_element_manager:8.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:communications_element_manager:8.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "7.7.2.24", "versionStartIncluding": "7.7.2.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "7.8.2.13", "versionStartIncluding": "7.8.2.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "8.2.0", "versionStartIncluding": "8.1.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*", "cpe_name": [], "versionEndIncluding": "8.8.1", "versionStartIncluding": "8.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*", "cpe_name": [], "versionEndIncluding": "10.12.0", "versionStartIncluding": "10.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*", "cpe_name": [], "versionEndExcluding": "12.8.1", "versionStartIncluding": "12.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*", "cpe_name": [], "versionEndExcluding": "10.16.3", "versionStartIncluding": "10.13.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*", "cpe_name": [], "versionEndExcluding": "8.16.1", "versionStartIncluding": "8.9.0", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2019-9517" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Some HTTP/2 implementations are vulnerable to unconstrained interal data buffering, potentially leading to a denial of service. The attacker opens the HTTP/2 window so the peer can send without constraint; however, they leave the TCP window closed so the peer cannot actually write (many of) the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the servers queue the responses, this can consume excess memory, CPU, or both." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-770" } ] } ] }, "references": { "reference_data": [ { "name": "VU#605641", "refsource": "CERT-VN", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://kb.cert.org/vuls/id/605641/" }, { "name": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "refsource": "MISC", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "name": "[httpd-announce] 20190814 CVE-2019-9517: mod_http2, DoS attack by exhausting h2 workers", "refsource": "MLIST", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://lists.apache.org/thread.html/4610762456644181b267c846423b3a990bd4aaea1886ecc7d51febdb@%3Cannounce.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048743 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E" }, { "name": "[oss-security] 20190814 CVE-2019-9517: mod_http2, DoS attack by exhausting h2 workers", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2019/08/15/7" }, { "name": "[httpd-dev] 20190817 Re: CVE-2019-10097 vs. CHANGEs entry", "refsource": "MLIST", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://lists.apache.org/thread.html/d89f999e26dfb1d50f247ead1fe8538014eb412b2dbe5be4b1a9ef50@%3Cdev.httpd.apache.org%3E" }, { "name": "[httpd-dev] 20190817 CVE-2019-10097 vs. CHANGEs entry", "refsource": "MLIST", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://lists.apache.org/thread.html/ec97fdfc1a859266e56fef084353a34e0a0b08901b3c1aa317a43c8c@%3Cdev.httpd.apache.org%3E" }, { "name": "https://www.synology.com/security/advisory/Synology_SA_19_33", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://www.synology.com/security/advisory/Synology_SA_19_33" }, { "name": "https://support.f5.com/csp/article/K02591030", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://support.f5.com/csp/article/K02591030" }, { "name": "https://security.netapp.com/advisory/ntap-20190823-0005/", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20190823-0005/" }, { "name": "https://security.netapp.com/advisory/ntap-20190823-0003/", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20190823-0003/" }, { "name": "FEDORA-2019-5a6a7bc12c", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP/" }, { "name": "FEDORA-2019-6a2980de56", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC/" }, { "name": "DSA-4509", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2019/dsa-4509" }, { "name": "20190826 [SECURITY] [DSA 4509-1] apache2 security update", "refsource": "BUGTRAQ", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://seclists.org/bugtraq/2019/Aug/47" }, { "name": "FEDORA-2019-4427fd65be", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BP556LEG3WENHZI5TAQ6ZEBFTJB4E2IS/" }, { "name": "USN-4113-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4113-1/" }, { "name": "FEDORA-2019-63ba15cc83", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XHTKU7YQ5EEP2XNSAV4M4VJ7QCBOJMOD/" }, { "name": "openSUSE-SU-2019:2051", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00004.html" }, { "name": "https://security.netapp.com/advisory/ntap-20190905-0003/", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20190905-0003/" }, { "name": "GLSA-201909-04", "refsource": "GENTOO", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201909-04" }, { "name": "openSUSE-SU-2019:2114", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html" }, { "name": "openSUSE-SU-2019:2115", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html" }, { "name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10296", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10296" }, { "name": "RHSA-2019:2893", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2893" }, { "name": "RHSA-2019:2925", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2925" }, { "name": "RHSA-2019:2939", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2939" }, { "name": "RHSA-2019:2946", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2946" }, { "name": "RHSA-2019:2950", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2950" }, { "name": "RHSA-2019:2949", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2949" }, { "name": "RHSA-2019:2955", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2955" }, { "name": "https://support.f5.com/csp/article/K02591030?utm_source=f5support\u0026amp;utm_medium=RSS", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://support.f5.com/csp/article/K02591030?utm_source=f5support\u0026amp;utm_medium=RSS" }, { "name": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html", "refsource": "MISC", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html" }, { "name": "RHSA-2019:3935", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3935" }, { "name": "RHSA-2019:3933", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3933" }, { "name": "RHSA-2019:3932", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3932" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058586 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E" }, { "name": "N/A", "refsource": "N/A", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210606 svn commit: r1075470 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073149 [13/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36@%3Ccvs.httpd.apache.org%3E" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6 } }, "lastModifiedDate": "2023-01-19T20:13Z", "publishedDate": "2019-08-13T21:15Z" } } }
wid-sec-w-2024-1591
Vulnerability from csaf_certbund
Published
2024-07-10 22:00
Modified
2024-11-11 23:00
Summary
Juniper JUNOS: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
JUNOS ist das "Juniper Network Operating System", das in Juniper Appliances verwendet wird.
Angriff
Ein Angreifer kann mehrere Schwachstellen in Juniper JUNOS ausnutzen, um einen Denial of Service zu verursachen, Informationen offenzulegen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive zu umgehen.
Betroffene Betriebssysteme
- Sonstiges
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "JUNOS ist das \"Juniper Network Operating System\", das in Juniper Appliances verwendet wird.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in Juniper JUNOS ausnutzen, um einen Denial of Service zu verursachen, Informationen offenzulegen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive zu umgehen.", "title": "Angriff" }, { "category": "general", "text": "- Sonstiges", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-1591 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1591.json" }, { "category": "self", "summary": "WID-SEC-2024-1591 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1591" }, { "category": "external", "summary": "Juniper Patchday July 2024 vom 2024-07-10", "url": "https://supportportal.juniper.net/s/global-search/%40uri?language=en_US#sort=%40sfcec_community_publish_date_formula__c%20descending\u0026numberOfResults=100\u0026f:ctype=%5BSecurity%20Advisories%5D" } ], "source_lang": "en-US", "title": "Juniper JUNOS: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-11-11T23:00:00.000+00:00", "generator": { "date": "2024-11-12T09:31:28.569+00:00", "engine": { "name": "BSI-WID", "version": "1.3.8" } }, "id": "WID-SEC-W-2024-1591", "initial_release_date": "2024-07-10T22:00:00.000+00:00", "revision_history": [ { "date": "2024-07-10T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-11-11T23:00:00.000+00:00", "number": "2", "summary": "URL Kodierung angepasst" } ], "status": "final", "version": "2" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Juniper JUNOS", "product": { "name": "Juniper JUNOS", "product_id": "T036093", "product_identification_helper": { "cpe": "cpe:/o:juniper:junos:-" } } } ], "category": "vendor", "name": "Juniper" } ] }, "vulnerabilities": [ { "cve": "CVE-2006-20001", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2006-20001" }, { "cve": "CVE-2007-5846", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2007-5846" }, { "cve": "CVE-2008-6123", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2008-6123" }, { "cve": "CVE-2011-1473", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2011-1473" }, { "cve": "CVE-2011-5094", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2011-5094" }, { "cve": "CVE-2012-6151", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2012-6151" }, { "cve": "CVE-2014-10064", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2014-10064" }, { "cve": "CVE-2014-2285", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2014-2285" }, { "cve": "CVE-2014-2310", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2014-2310" }, { "cve": "CVE-2014-3565", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2014-3565" }, { "cve": "CVE-2014-7191", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2014-7191" }, { "cve": "CVE-2014-8882", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2014-8882" }, { "cve": "CVE-2015-5621", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2015-5621" }, { "cve": "CVE-2015-8100", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2015-8100" }, { "cve": "CVE-2015-9262", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2015-9262" }, { "cve": "CVE-2016-1000232", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2016-1000232" }, { "cve": "CVE-2016-10540", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2016-10540" }, { "cve": "CVE-2016-4658", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2016-4658" }, { "cve": "CVE-2017-1000048", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2017-1000048" }, { "cve": "CVE-2017-15010", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2017-15010" }, { "cve": "CVE-2018-18065", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2018-18065" }, { "cve": "CVE-2018-20834", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2018-20834" }, { "cve": "CVE-2018-3737", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2018-3737" }, { "cve": "CVE-2018-7408", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2018-7408" }, { "cve": "CVE-2019-10081", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2019-10081" }, { "cve": "CVE-2019-10082", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2019-10082" }, { "cve": "CVE-2019-10092", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2019-10092" }, { "cve": "CVE-2019-10097", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2019-10097" }, { "cve": "CVE-2019-10098", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2019-10098" }, { "cve": "CVE-2019-11719", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2019-11719" }, { "cve": "CVE-2019-11727", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2019-11727" }, { "cve": "CVE-2019-11756", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2019-11756" }, { "cve": "CVE-2019-16775", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2019-16775" }, { "cve": "CVE-2019-16776", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2019-16776" }, { "cve": "CVE-2019-16777", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2019-16777" }, { "cve": "CVE-2019-17006", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2019-17006" }, { "cve": "CVE-2019-17023", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2019-17023" }, { "cve": "CVE-2019-17567", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2019-17567" }, { "cve": "CVE-2019-20149", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2019-20149" }, { "cve": "CVE-2019-20892", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2019-20892" }, { "cve": "CVE-2019-9517", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2019-9517" }, { "cve": "CVE-2020-11668", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-11668" }, { "cve": "CVE-2020-11984", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-11984" }, { "cve": "CVE-2020-11993", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-11993" }, { "cve": "CVE-2020-12362", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-12362" }, { "cve": "CVE-2020-12400", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-12400" }, { "cve": "CVE-2020-12401", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-12401" }, { "cve": "CVE-2020-12402", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-12402" }, { "cve": "CVE-2020-12403", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-12403" }, { "cve": "CVE-2020-13938", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-13938" }, { "cve": "CVE-2020-13950", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-13950" }, { "cve": "CVE-2020-14145", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-14145" }, { "cve": "CVE-2020-15861", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-15861" }, { "cve": "CVE-2020-15862", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-15862" }, { "cve": "CVE-2020-1927", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-1927" }, { "cve": "CVE-2020-1934", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-1934" }, { "cve": "CVE-2020-28469", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-28469" }, { "cve": "CVE-2020-28502", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-28502" }, { "cve": "CVE-2020-35452", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-35452" }, { "cve": "CVE-2020-36049", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-36049" }, { "cve": "CVE-2020-6829", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-6829" }, { "cve": "CVE-2020-7660", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-7660" }, { "cve": "CVE-2020-7754", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-7754" }, { "cve": "CVE-2020-7774", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-7774" }, { "cve": "CVE-2020-8648", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-8648" }, { "cve": "CVE-2020-9490", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2020-9490" }, { "cve": "CVE-2021-22543", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-22543" }, { "cve": "CVE-2021-2342", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-2342" }, { "cve": "CVE-2021-23440", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-23440" }, { "cve": "CVE-2021-2356", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-2356" }, { "cve": "CVE-2021-2372", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-2372" }, { "cve": "CVE-2021-2385", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-2385" }, { "cve": "CVE-2021-2389", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-2389" }, { "cve": "CVE-2021-2390", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-2390" }, { "cve": "CVE-2021-25745", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-25745" }, { "cve": "CVE-2021-25746", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-25746" }, { "cve": "CVE-2021-25748", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-25748" }, { "cve": "CVE-2021-26690", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-26690" }, { "cve": "CVE-2021-26691", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-26691" }, { "cve": "CVE-2021-27290", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-27290" }, { "cve": "CVE-2021-29469", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-29469" }, { "cve": "CVE-2021-30641", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-30641" }, { "cve": "CVE-2021-31535", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-31535" }, { "cve": "CVE-2021-31618", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-31618" }, { "cve": "CVE-2021-3177", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-3177" }, { "cve": "CVE-2021-32803", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-32803" }, { "cve": "CVE-2021-32804", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-32804" }, { "cve": "CVE-2021-33033", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-33033" }, { "cve": "CVE-2021-33034", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-33034" }, { "cve": "CVE-2021-33193", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-33193" }, { "cve": "CVE-2021-3347", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-3347" }, { "cve": "CVE-2021-33909", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-33909" }, { "cve": "CVE-2021-34798", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-34798" }, { "cve": "CVE-2021-35604", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-35604" }, { "cve": "CVE-2021-35624", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-35624" }, { "cve": "CVE-2021-36160", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-36160" }, { "cve": "CVE-2021-37701", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-37701" }, { "cve": "CVE-2021-37712", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-37712" }, { "cve": "CVE-2021-37713", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-37713" }, { "cve": "CVE-2021-3803", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-3803" }, { "cve": "CVE-2021-39275", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-39275" }, { "cve": "CVE-2021-40438", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-40438" }, { "cve": "CVE-2021-41524", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-41524" }, { "cve": "CVE-2021-41773", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-41773" }, { "cve": "CVE-2021-42013", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-42013" }, { "cve": "CVE-2021-43527", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-43527" }, { "cve": "CVE-2021-44224", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-44224" }, { "cve": "CVE-2021-44225", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-44225" }, { "cve": "CVE-2021-44790", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-44790" }, { "cve": "CVE-2021-44906", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2021-44906" }, { "cve": "CVE-2022-21245", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-21245" }, { "cve": "CVE-2022-21270", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-21270" }, { "cve": "CVE-2022-21303", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-21303" }, { "cve": "CVE-2022-21304", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-21304" }, { "cve": "CVE-2022-21344", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-21344" }, { "cve": "CVE-2022-21367", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-21367" }, { "cve": "CVE-2022-21417", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-21417" }, { "cve": "CVE-2022-21427", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-21427" }, { "cve": "CVE-2022-21444", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-21444" }, { "cve": "CVE-2022-21451", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-21451" }, { "cve": "CVE-2022-21454", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-21454" }, { "cve": "CVE-2022-21460", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-21460" }, { "cve": "CVE-2022-21589", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-21589" }, { "cve": "CVE-2022-21592", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-21592" }, { "cve": "CVE-2022-21595", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-21595" }, { "cve": "CVE-2022-21608", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-21608" }, { "cve": "CVE-2022-21617", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-21617" }, { "cve": "CVE-2022-22719", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-22719" }, { "cve": "CVE-2022-22720", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-22720" }, { "cve": "CVE-2022-22721", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-22721" }, { "cve": "CVE-2022-22822", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-22822" }, { "cve": "CVE-2022-22823", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-22823" }, { "cve": "CVE-2022-22824", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-22824" }, { "cve": "CVE-2022-23471", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-23471" }, { "cve": "CVE-2022-23524", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-23524" }, { "cve": "CVE-2022-23525", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-23525" }, { "cve": "CVE-2022-23526", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-23526" }, { "cve": "CVE-2022-23852", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-23852" }, { "cve": "CVE-2022-23943", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-23943" }, { "cve": "CVE-2022-25147", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-25147" }, { "cve": "CVE-2022-25235", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-25235" }, { "cve": "CVE-2022-25236", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-25236" }, { "cve": "CVE-2022-2526", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-2526" }, { "cve": "CVE-2022-25315", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-25315" }, { "cve": "CVE-2022-26377", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-26377" }, { "cve": "CVE-2022-28330", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-28330" }, { "cve": "CVE-2022-28614", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-28614" }, { "cve": "CVE-2022-28615", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-28615" }, { "cve": "CVE-2022-29167", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-29167" }, { "cve": "CVE-2022-29404", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-29404" }, { "cve": "CVE-2022-30522", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-30522" }, { "cve": "CVE-2022-30556", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-30556" }, { "cve": "CVE-2022-31813", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-31813" }, { "cve": "CVE-2022-3517", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-3517" }, { "cve": "CVE-2022-3564", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-3564" }, { "cve": "CVE-2022-36760", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-36760" }, { "cve": "CVE-2022-37434", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-37434" }, { "cve": "CVE-2022-37436", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-37436" }, { "cve": "CVE-2022-40674", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-40674" }, { "cve": "CVE-2022-41741", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-41741" }, { "cve": "CVE-2022-41742", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-41742" }, { "cve": "CVE-2022-4203", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-4203" }, { "cve": "CVE-2022-4304", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-4304" }, { "cve": "CVE-2022-4450", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-4450" }, { "cve": "CVE-2022-46663", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-46663" }, { "cve": "CVE-2022-4886", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2022-4886" }, { "cve": "CVE-2023-0215", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-0215" }, { "cve": "CVE-2023-0216", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-0216" }, { "cve": "CVE-2023-0217", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-0217" }, { "cve": "CVE-2023-0286", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-0286" }, { "cve": "CVE-2023-0401", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-0401" }, { "cve": "CVE-2023-0464", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-0464" }, { "cve": "CVE-2023-0465", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-0465" }, { "cve": "CVE-2023-0466", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-0466" }, { "cve": "CVE-2023-0767", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-0767" }, { "cve": "CVE-2023-1255", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-1255" }, { "cve": "CVE-2023-2002", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-2002" }, { "cve": "CVE-2023-20593", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-20593" }, { "cve": "CVE-2023-21830", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-21830" }, { "cve": "CVE-2023-21840", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-21840" }, { "cve": "CVE-2023-21843", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-21843" }, { "cve": "CVE-2023-21912", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-21912" }, { "cve": "CVE-2023-21963", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-21963" }, { "cve": "CVE-2023-21980", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-21980" }, { "cve": "CVE-2023-22025", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-22025" }, { "cve": "CVE-2023-22067", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-22067" }, { "cve": "CVE-2023-22081", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-22081" }, { "cve": "CVE-2023-22652", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-22652" }, { "cve": "CVE-2023-24329", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-24329" }, { "cve": "CVE-2023-25153", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-25153" }, { "cve": "CVE-2023-25173", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-25173" }, { "cve": "CVE-2023-25690", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-25690" }, { "cve": "CVE-2023-2700", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-2700" }, { "cve": "CVE-2023-27522", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-27522" }, { "cve": "CVE-2023-2828", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-2828" }, { "cve": "CVE-2023-28840", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-28840" }, { "cve": "CVE-2023-28841", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-28841" }, { "cve": "CVE-2023-28842", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-28842" }, { "cve": "CVE-2023-2975", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-2975" }, { "cve": "CVE-2023-30079", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-30079" }, { "cve": "CVE-2023-30630", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-30630" }, { "cve": "CVE-2023-3090", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-3090" }, { "cve": "CVE-2023-32067", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-32067" }, { "cve": "CVE-2023-32360", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-32360" }, { "cve": "CVE-2023-32435", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-32435" }, { "cve": "CVE-2023-32439", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-32439" }, { "cve": "CVE-2023-32732", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-32732" }, { "cve": "CVE-2023-3341", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-3341" }, { "cve": "CVE-2023-3390", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-3390" }, { "cve": "CVE-2023-33953", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-33953" }, { "cve": "CVE-2023-34058", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-34058" }, { "cve": "CVE-2023-34059", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-34059" }, { "cve": "CVE-2023-3446", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-3446" }, { "cve": "CVE-2023-34969", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-34969" }, { "cve": "CVE-2023-35001", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-35001" }, { "cve": "CVE-2023-35788", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-35788" }, { "cve": "CVE-2023-3611", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-3611" }, { "cve": "CVE-2023-37450", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-37450" }, { "cve": "CVE-2023-3776", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-3776" }, { "cve": "CVE-2023-3817", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-3817" }, { "cve": "CVE-2023-4004", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-4004" }, { "cve": "CVE-2023-4206", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-4206" }, { "cve": "CVE-2023-4207", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-4207" }, { "cve": "CVE-2023-4208", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-4208" }, { "cve": "CVE-2023-42753", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-42753" }, { "cve": "CVE-2023-4785", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-4785" }, { "cve": "CVE-2023-4807", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-4807" }, { "cve": "CVE-2023-4863", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-4863" }, { "cve": "CVE-2023-5043", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-5043" }, { "cve": "CVE-2023-5129", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-5129" }, { "cve": "CVE-2023-5363", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2023-5363" }, { "cve": "CVE-2024-20918", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-20918" }, { "cve": "CVE-2024-20919", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-20919" }, { "cve": "CVE-2024-20921", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-20921" }, { "cve": "CVE-2024-20926", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-20926" }, { "cve": "CVE-2024-20932", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-20932" }, { "cve": "CVE-2024-20945", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-20945" }, { "cve": "CVE-2024-20952", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-20952" }, { "cve": "CVE-2024-39511", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39511" }, { "cve": "CVE-2024-39512", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39512" }, { "cve": "CVE-2024-39513", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39513" }, { "cve": "CVE-2024-39514", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39514" }, { "cve": "CVE-2024-39517", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39517" }, { "cve": "CVE-2024-39518", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39518" }, { "cve": "CVE-2024-39519", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39519" }, { "cve": "CVE-2024-39520", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39520" }, { "cve": "CVE-2024-39521", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39521" }, { "cve": "CVE-2024-39522", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39522" }, { "cve": "CVE-2024-39523", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39523" }, { "cve": "CVE-2024-39524", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39524" }, { "cve": "CVE-2024-39528", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39528" }, { "cve": "CVE-2024-39529", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39529" }, { "cve": "CVE-2024-39530", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39530" }, { "cve": "CVE-2024-39531", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39531" }, { "cve": "CVE-2024-39532", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39532" }, { "cve": "CVE-2024-39533", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39533" }, { "cve": "CVE-2024-39535", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39535" }, { "cve": "CVE-2024-39536", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39536" }, { "cve": "CVE-2024-39537", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39537" }, { "cve": "CVE-2024-39538", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39538" }, { "cve": "CVE-2024-39539", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39539" }, { "cve": "CVE-2024-39540", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39540" }, { "cve": "CVE-2024-39541", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39541" }, { "cve": "CVE-2024-39542", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39542" }, { "cve": "CVE-2024-39543", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39543" }, { "cve": "CVE-2024-39545", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39545" }, { "cve": "CVE-2024-39546", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39546" }, { "cve": "CVE-2024-39548", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39548" }, { "cve": "CVE-2024-39549", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39549" }, { "cve": "CVE-2024-39550", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39550" }, { "cve": "CVE-2024-39551", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39551" }, { "cve": "CVE-2024-39553", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39553" }, { "cve": "CVE-2024-39554", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39554" }, { "cve": "CVE-2024-39555", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39555" }, { "cve": "CVE-2024-39556", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39556" }, { "cve": "CVE-2024-39557", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39557" }, { "cve": "CVE-2024-39558", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39558" }, { "cve": "CVE-2024-39559", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39559" }, { "cve": "CVE-2024-39560", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39560" }, { "cve": "CVE-2024-39561", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39561" }, { "cve": "CVE-2024-39565", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T036093" ] }, "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-39565" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…